2022
DOI: 10.15587/1729-4061.2022.252135
|View full text |Cite
|
Sign up to set email alerts
|

Devising a procedure to determine the level of informational space security in social networks considering interrelations among users

Abstract: + Linear and dynamic models of the system of information security in social networks, taking into consideration the relationships between users, were studied and the resistance of the security system was analyzed. There is a practical interest in studying dependence of the behavior of the system of social network security on the parameters of users’ interaction. Dynamic systems of information security in social networks in the mathematical sense of this term were considered. A dynamic system refers to any obje… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(13 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…Articles [2,4] present a nonlinear model of the security system. The dependence of the protection indicator on the interaction between actors is investigated.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Articles [2,4] present a nonlinear model of the security system. The dependence of the protection indicator on the interaction between actors is investigated.…”
Section: Literature Reviewmentioning
confidence: 99%
“…where 2 L , 3 L etc., 2 K , 3 K etc.some linear operators. Similarly, to [1,2,4], we use the method of sequential approximation and introduce nonlinear components of (3), taking into account the slight nonlinearity of the information security system:…”
Section: Research On the System Of Combating Hazardsmentioning
confidence: 99%
See 1 more Smart Citation
“…The closest in meaning, works [1,2,5,8,9]. In work [2], the analysis of the impact, taking into account the duration of the path between clients and other characteristics of the SM on the ISI was performed.…”
Section: Introductionmentioning
confidence: 99%
“…In [1] a method of determining trust and protection of personal data in social networks was developed. In research [4,5] the clustering coefficients for social networks, including power ones, are considered. In [6] the system of protection of the social network from the indicators of the relationship between users and the amount of information flow is studied.…”
Section: Introductionmentioning
confidence: 99%