Alexander A. Grusho

Orcid: 0000-0003-4400-2158

Affiliations:
  • Russian Academy of Sciences, Institute of Informatics Problems


According to our database1, Alexander A. Grusho authored at least 32 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Trust Evaluation Problems in Big Data Analytics.
Autom. Control. Comput. Sci., December, 2022

2021
Use of Contradictions in Data for Finding Implicit Failures in Computer Systems.
Autom. Control. Comput. Sci., 2021

Localization of the Root Cause of the Anomaly.
Autom. Control. Comput. Sci., 2021

Metadata For Root Cause Analysis.
Proceedings of the 35th International ECMS International Conference on Modelling and Simulation, 2021

2020
Localizing Failures with Metadata.
Autom. Control. Comput. Sci., 2020

Probability Model Of Concepts Recovery In Small Sample Learning.
Proceedings of the 34th International ECMS Conference on Modelling and Simulation, 2020

Generation of Metadata for Network Control.
Proceedings of the Distributed Computer and Communication Networks, 2020

2019
Method of Several Information Spaces for Identification of Anomalies.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Protection Of Valuable Information In Public Information Space.
Proceedings of the 33rd International ECMS Conference on Modelling and Simulation, 2019

The Bans in Finite Probability Spaces and the Problem of Small Samples.
Proceedings of the Distributed Computer and Communication Networks, 2019

Information Flow Control on the Basis of Meta Data.
Proceedings of the Distributed Computer and Communication Networks, 2019

2018
Protection of Valuable Information in Information Technologies.
Autom. Control. Comput. Sci., 2018

2017
Information security architecture synthesis in distributed information computation systems.
Autom. Control. Comput. Sci., 2017

Information Security of SDN on the Basis of Meta Data.
Proceedings of the Computer Network Security, 2017

Data Mining and Information Security.
Proceedings of the Computer Network Security, 2017

Analysis of information security of distributed information systems.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

Modelling For Ensuring Information Security Of The Distributed Information Systems.
Proceedings of the European Conference on Modelling and Simulation, 2017

Security Models Based on Stochastic Meta Data.
Proceedings of the Analytical and Computational Methods in Probability Theory, 2017

2016
Intelligent data analysis in information security.
Autom. Control. Comput. Sci., 2016

Detection of anomalies in non-numerical data.
Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2016

Statistical Classification In Monitoring Systems.
Proceedings of the 30th European Conference on Modelling and Simulation, 2016

2015
Architecture of consecutive identification of attack to information resources.
Proceedings of the 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2015

Power Functions Of Statistical Criteria Defined By Bans.
Proceedings of the 29th European Conference on Modelling and Simulation, 2015

2014
Generation Of Probability Measures With The Given Specification Of The Smallest Bans.
Proceedings of the 28th European Conference on Modelling and Simulation, 2014

2013
Criteria On Statistically Defined Bans.
Proceedings of the 27th European Conference on Modelling and Simulation, 2013

2012
Alternative Mechanisms for Information Security.
Proceedings of the Computer Network Security, 2012

2010
Problems of Modeling in the Analysis of Covert Channels.
Proceedings of the Computer Network Security, 2010

Consistency of statistical criteria and model transformation.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010

2005
Detection of Illegal Information Flow.
Proceedings of the Computer Network Security, 2005

Statistical Covert Channels Through PROXY Server.
Proceedings of the Computer Network Security, 2005

2003
Construction of the Covert Channels.
Proceedings of the Computer Network Security, 2003

2001
Mathematical Models of the Covert Channels.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001


  Loading...