2022
DOI: 10.35784/iapgos.3033
|View full text |Cite
|
Sign up to set email alerts
|

Simulation of Information Security Risks of Availability of Project Documents Based on Fuzzy Logic

Abstract: The widespread use of computer technology, its rapid development and use in almost all areas of human activity requires constant updating of information security issues. The activities of many enterprises in the field of IT, construction, and other areas are of a project nature and therefore further research on information security management of projects is relevant. Appearance of changes and the current state of the project results at certain points of time describe the documents that accompany it. In this pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 16 publications
0
1
0
Order By: Relevance
“…A component of the digital twin development for the NSC is the modelling of decision-making regarding the management of its ventilation system under non-stationary wind loads. Fuzzy logic, proposed by L. Zadeh [14], allows for solving modelling and control tasks in various domains [12], and its combination with artificial neural networks has simplified the model-building processes [3,13].…”
Section: Introductionmentioning
confidence: 99%
“…A component of the digital twin development for the NSC is the modelling of decision-making regarding the management of its ventilation system under non-stationary wind loads. Fuzzy logic, proposed by L. Zadeh [14], allows for solving modelling and control tasks in various domains [12], and its combination with artificial neural networks has simplified the model-building processes [3,13].…”
Section: Introductionmentioning
confidence: 99%
“…IoT are very common for protection of information in modern telecommunication networks [10,22]. One of the most important functions of effective protection of the organization's information system is threat tracking and analysis and calculation of quantitative indicators of the functional properties of the security of content distributed in networks [1,3,5,8,9,12,19]. In [11] methods for ensuring data security in mobile standards are presented.…”
Section: Introductionmentioning
confidence: 99%