|
|
|
Publications in Math-Net.Ru |
Citations |
|
2025 |
| 1. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, V. V. Kulchenkov, E. E. Timonina, “Classification of small sets of data of large dimension”, Inform. Primen., 19:3 (2025), 67–72 |
| 2. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, V. O. Piskovski, E. E. Timonina, “Machine learning and trust in classification results”, Inform. Primen., 19:2 (2025), 63–68 |
| 3. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Analysis of failures by indirect features”, Sistemy i Sredstva Inform., 35:1 (2025), 59–70 |
|
2024 |
| 4. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, V. V. Kulchenkov, E. E. Timonina, “Identification of cause-and-effect relationships when covering causes”, Inform. Primen., 18:2 (2024), 54–59 |
3
|
| 5. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, V. O. Piskovski, E. E. Timonina, S. Ya. Shorgin, “Logic of deception in machine learning”, Inform. Primen., 18:1 (2024), 78–83 |
3
|
| 6. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinny, D. V. Smirnov, E. E. Timonina, “Functional safety monitoring of large service systems”, Sistemy i Sredstva Inform., 34:3 (2024), 3–13 |
|
2023 |
| 7. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, “Classification by cause-and-effect relationships”, Inform. Primen., 17:3 (2023), 71–75 |
1
|
| 8. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina, S. Ya. Shorgin, “Complex cause-and-effect relationships”, Inform. Primen., 17:2 (2023), 84–89 |
3
|
| 9. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, V. V. Kulchenkov, E. E. Timonina, S. Ya. Shorgin, “Causal relationships in classification problems”, Inform. Primen., 17:1 (2023), 43–49 |
8
|
| 10. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, V. O. Piskovski, D. V. Smirnov, E. E. Timonina, “Automata models of fault propagation and self-healing”, Sistemy i Sredstva Inform., 33:4 (2023), 28–37 |
| 11. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinny, E. E. Timonina, “Some challenges of critical infrastructure information security monitoring”, Sistemy i Sredstva Inform., 33:3 (2023), 108–116 |
| 12. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinny, E. E. Timonina, S. Ya. Shorgin, “Classification problem in conditions of distorted cause-and-effect relationships”, Sistemy i Sredstva Inform., 33:1 (2023), 59–67 |
1
|
|
2022 |
| 13. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “About the secure architecture of a microservice-based computing system”, Inform. Primen., 16:4 (2022), 87–92 |
| 14. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Metadata in secure electronic document management”, Inform. Primen., 16:3 (2022), 97–102 |
| 15. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, A. A. Zatsarinny, E. E. Timonina, S. Ya. Shorgin, “Cause-and-effect chain analysis”, Inform. Primen., 16:2 (2022), 68–74 |
2
|
| 16. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Detection of distribution drift”, Sistemy i Sredstva Inform., 32:4 (2022), 14–20 |
| 17. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Some approaches to network DLP analysis”, Sistemy i Sredstva Inform., 32:2 (2022), 72–80 |
| 18. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Search of anomalies in big data”, Sistemy i Sredstva Inform., 32:1 (2022), 160–167 |
2
|
|
2021 |
| 19. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, S. Ya. Shorgin, “Statistics and clusters for detection of anomalous insertions in Big Data environment”, Inform. Primen., 15:4 (2021), 79–86 |
4
|
| 20. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “Remote monitoring of workflows”, Inform. Primen., 15:3 (2021), 2–8 |
2
|
| 21. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “Hidden impact without malicious code”, Sistemy i Sredstva Inform., 31:2 (2021), 4–15 |
1
|
| 22. |
M. I. Zabezhailo, A. A. Grusho, N. A. Grusho, E. E. Timonina, “Support for solving diagnostic type problems”, Sistemy i Sredstva Inform., 31:1 (2021), 69–81 |
7
|
|
2020 |
| 23. |
A. A. Grusho, E. E. Timonina, N. A. Grusho, I. Yu. Teryokhina, “Identifying anomalies using metadata”, Inform. Primen., 14:3 (2020), 76–80 |
2
|
| 24. |
N. A. Grusho, A. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “Methods of finding the causes of information technology failures by means of metadata”, Inform. Primen., 14:2 (2020), 33–39 |
7
|
| 25. |
A. A. Grusho, N. A. Grusho, V. V. Senchilo, E. E. Timonina, “Prevention of mass failure of low-security mobile systems of information support for digital economy”, Sistemy i Sredstva Inform., 30:2 (2020), 21–30 |
| 26. |
A. A. Grusho, N. A. Grusho, A. V. Nikolaev, V. O. Piskovski, V. V. Senchilo, E. E. Timonina, “Generation of threats in heterogeneous systems of digital economy”, Sistemy i Sredstva Inform., 30:1 (2020), 46–55 |
|
2019 |
| 27. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Using metadata to implement multilevel security policy requirements”, Inform. Primen., 13:4 (2019), 85–89 |
| 28. |
A. A. Grusho, M. I. Zabezhailo, N. A. Grusho, E. E. Timonina, “Concepts forming on the basis of small samples”, Inform. Primen., 13:4 (2019), 81–84 |
1
|
| 29. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Methods of identification of “weak” signs of violations of information security”, Inform. Primen., 13:3 (2019), 3–8 |
3
|
| 30. |
A. A. Grusho, M. I. Zabezhailo, N. A. Grusho, E. E. Timonina, “Architectural decisions in the problem of identification of fraud in the analysis of information flows in digital economy”, Inform. Primen., 13:2 (2019), 22–28 |
| 31. |
A. A. Grusho, M. I. Zabezhailo, N. A. Grusho, E. E. Timonina, “Search of empirical causes of failures and errors in computer systems and networks using metadata”, Sistemy i Sredstva Inform., 29:4 (2019), 28–38 |
3
|
| 32. |
N. A. Grusho, “Methods of identification of “weak” signs of violations of information security”, Sistemy i Sredstva Inform., 29:3 (2019), 194–201 |
1
|
| 33. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Methods of protection against mass inactivation of low protected computers of digital economy”, Sistemy i Sredstva Inform., 29:1 (2019), 4–11 |
2
|
|
2018 |
| 34. |
A. A. Grusho, N. A. Grusho, M. V. Levykin, E. E. Timonina, “Methods of identification of host capture in a distributed information system which is protected on the basis of meta data”, Inform. Primen., 12:4 (2018), 39–43 |
3
|
| 35. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, D. V. Smirnov, E. E. Timonina, “Parametrization in applied problems of search of empirical reasons”, Inform. Primen., 12:3 (2018), 62–66 |
7
|
| 36. |
A. A. Grusho, M. I. Zabezhailo, N. A. Grusho, E. E. Timonina, “Information security on the basis of meta data in enterprise application integration architecture of information systems”, Sistemy i Sredstva Inform., 28:2 (2018), 34–41 |
3
|
| 37. |
N. A. Grusho, V. V. Senchilo, “Modeling of secure architecture of distributed information systems on the basis of integrated virtualization”, Sistemy i Sredstva Inform., 28:1 (2018), 110–122 |
1
|
|
2016 |
| 38. |
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “Integration of statistical and deterministic methods for analysis of information security”, Inform. Primen., 10:3 (2016), 2–8 |
2
|
| 39. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Security evaluation in secure architecture of distributed information systems”, Sistemy i Sredstva Inform., 26:4 (2016), 31–37 |
2
|
| 40. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, S. Ya. Shorgin, “Architectural vulnerabilities of distributed information systems”, Sistemy i Sredstva Inform., 26:3 (2016), 74–82 |
2
|
|
2015 |
| 41. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Rate of information transfer and capacity in covert channels defined by tags”, Inform. Primen., 9:4 (2015), 85–90 |
| 42. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, S. Ya. Shorgin, “Possibilities of secure architecture creation for dynamically changing information systems”, Sistemy i Sredstva Inform., 25:3 (2015), 78–93 |
9
|
|
2014 |
| 43. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Switching on of new bans in random sequences”, Inform. Primen., 8:4 (2014), 46–52 |
1
|
| 44. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “The analysis of tags in covert channels”, Inform. Primen., 8:4 (2014), 41–45 |
4
|
| 45. |
N. A. Grusho, “Covert channels on the wireless networks of the standard 802.11”, Sistemy i Sredstva Inform., 24:3 (2014), 32–43 |
| 46. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, S. Ya. Shorgin, “Secure architecture of distributed systems”, Sistemy i Sredstva Inform., 24:3 (2014), 18–31 |
10
|
|
2013 |
| 47. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Statistical techniques of bans determination of probability measures in discrete spaces”, Inform. Primen., 7:1 (2013), 54–57 |
5
|
| 48. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Covert channels generated by tags in datagrams”, Sistemy i Sredstva Inform., 23:2 (2013), 6–21 |
2
|
| 49. |
N. A. Grusho, “Covert channels generated by tags”, Sistemy i Sredstva Inform., 23:1 (2013), 7–13 |
4
|
|
2011 |
| 50. |
N. A. Grusho, “Distributed information systems on the base of networks with low channel capacity”, Sistemy i Sredstva Inform., 21:2 (2011), 65–68 |
|
2010 |
| 51. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Search of the conflicts in security policies: a model of random graphs”, Inform. Primen., 4:3 (2010), 38–41 |
|
2008 |
| 52. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “Theorems on the nonexistence of consistent sequences of criteria in some discrete problems”, Diskr. Mat., 20:2 (2008), 25–31 |
3
|
| 53. |
Alexander Grusho, Nick Grusho, Elena Timonina, “Complexity and consistency of statistical criteria”, Sistemy i Sredstva Inform., 2008, no. special issue, 32–39 |
|
2007 |
| 54. |
A. A. Grusho, N. A. Grusho, E. E. Timonina, “About security and safety of security subsystems in distributed information systems”, Sistemy i Sredstva Inform., 2007, no. 17, 79–85 |
|
| Organisations |
|
| |
|
|