2017 XX IEEE International Conference on Soft Computing and Measurements (SCM) 2017
DOI: 10.1109/scm.2017.7970566
|View full text |Cite
|
Sign up to set email alerts
|

Organization of the entrusted calculations in crucial objects of informatization under uncertainty

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Soft computing is normally undertaken in apparent cases of available statistics on testing and debugging software products and systems. As mentioned before, the most popular approaches include the use of artificial neural system technologies [19,[31][32][33] and fuzzy set apparatus [34][35][36][37]. Given below are examples of developing such models.…”
Section: Use Of Soft Computingmentioning
confidence: 99%
“…Soft computing is normally undertaken in apparent cases of available statistics on testing and debugging software products and systems. As mentioned before, the most popular approaches include the use of artificial neural system technologies [19,[31][32][33] and fuzzy set apparatus [34][35][36][37]. Given below are examples of developing such models.…”
Section: Use Of Soft Computingmentioning
confidence: 99%
“…Incomplete information on the software structure, principles and functioning, heterogeneity of its composition, presence of imported elements, and insufficient specifications make it difficult to evaluate and predict the software reliability. In these cases, traditional approaches to acquisition and forecasting of reliable values are associated with significant costs; that is why models based on the fuzzy sets of theory that allow estimating the software reliability with practically acceptable accuracy are of immediate interest [26][27][28].…”
Section: Fuzzy Model Of Software Reliability and Security Evaluation-mentioning
confidence: 99%
“…In most countries requirements for information security critical information infrastructure are mostly of a voluntary nature, but in connection with the increasingly active terrorist groups using cyber-attacks, the nature of these claims is gradually shifting towards mandatory [1] legislation in combating cybercrime and protecting critical infrastructure are becoming tougher all over the world.…”
Section: Introductionmentioning
confidence: 99%