PROCEDURES FOR INVESTMENT IN CYBER SECURITY, TAKING INTO ACCOUNT MULTIFACTORITY AND FUZZY STATEMENT
نویسندگان
چکیده
It is shown that the application of multi-step quality games theory allows financing various information technologies considering factors. In particular, there are lots approaches to building effective security systems in enterprise. Using such model will make it possible develop, based on game models, decision support (DSS), for example, software products (PP). Which, turn, allow making rational decisions investing development technologies. This circumstance makes necessary and relevant develop new models can implement procedures process finding investment strategies, including field enterprises, obtaining forecast assessment feasibility a specific strategy. The proposed by us analysis investors technology protecting tasks case their multi-factoring fuzzy setting. management proposed, using example informatization objects taking into account setting DSS computational core. difference between previously developed ones considers as complex structure, which not enough single-factor category. Computational experiments were performed model. simulation results visualized Python programming language, you optimize managing.
منابع مشابه
Taking into account Java’s Security Manager for static verification
The verification of Java programs is a difficult task, especially with components like the Security Manager which modify the semantic of the Java Virtual Machine (JVM). To model this invasive behaviour the Security Manager can be implemented as an aspect component, using AspectJ. In this paper we describe a framework for static verification of Java programs containing AspectJ advices specified ...
متن کاملDecision support approaches for cyber security investment
When investing in cyber security resources, information security managers have to follow effective decision-making strategies. We refer to this as the cyber security investment challenge. In this paper, we consider three possible decision support methodologies for security managers to tackle this challenge. We consider methods based on game theory, combinatorial optimisation, and a hybrid of th...
متن کاملA New Heuristic Algorithm for Time-cost Trade-off Problem Taking into Account Monetary Value
Time-cost trade-off is one of the most important subjects in project management and of interest to contractors. The goal of time-cost trade-off is sensivity analysis of project costs to changes in activity duration in order to obtain the best combination of activity duration decrease, in a way that the sum of project costs is minimized. In the heuristics presented in this area, time crashing is...
متن کاملA New Heuristic Algorithm for Time-cost Trade-off Problem Taking into Account Monetary Value
Time-cost trade-off is one of the most important subjects in project management and of interest to contractors. The goal of time-cost trade-off is sensivity analysis of project costs to changes in activity duration in order to obtain the best combination of activity duration decrease, in a way that the sum of project costs is minimized. In the heuristics presented in this area, time crashing is...
متن کاملOptimization procedures for establishing reserve networks for biodiversity conservation taking into account population genetic structure
Conservation genetics has been focused on the ecological and evolutionary persistence of targets (species or other intraspecific units), especially when dealing with narrow-ranged species, and no generalized solution regarding the problem of where to concentrate conservation efforts for multiple genetic targets has yet been achieved. Broadly distributed and abundant species allow the identifica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Kìberbezpeka. osvìta, nauka, tehnìka
سال: 2021
ISSN: ['2663-4023']
DOI: https://doi.org/10.28925/2663-4023.2021.11.615