To see the other types of publications on this topic, follow the link: Violator model.

Journal articles on the topic 'Violator model'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Violator model.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Pavlicheva, E. N., F. O. Fedin, A. S. Chiskidov, and N. F. Glybin. "MODEL OF AN INFORMATION SECURITY INTRUDER FOR AN OBJECT OF CRITICAL INFORMATION INFRASTRUCTURE OF A TRANSPORT SERVICES TRADING PLATFORM." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 203 (May 2021): 28–34. http://dx.doi.org/10.14489/vkit.2021.05.pp.028-034.

Full text
Abstract:
The paper presents an approach to the formation of a string model of an intruder of information security of objects of critical information infrastructure of trading platforms for transport services, based on an assessment of the violator's capabilities for physical and logical access to information, an assessment of his competence, equipment and motivation. The prerequisites for the appearance of an infringer of information security of objects of critical information infrastructure are considered. It is described which subjects can act as violators of information security objects of the criti
APA, Harvard, Vancouver, ISO, and other styles
2

An, Shi, Jianxun Cui, Meng Zhao, and Jian Wang. "A Study of Network Violator Interception Based on a Reliable Game Model." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/124343.

Full text
Abstract:
This study focuses on planning interceptor locations in a general transportation network to maximize the expected benefits from catching violators mixing in public traveler flow. Two reliability-related characteristics are also integrated into the planning model to make it more practical. One is that each interceptor (e.g., a sensor or a checkpoint) has a failure probability. The second is the existence of a “game” between the interceptor planner and violators. A nonlinear nonconvex binary integer programming model is presented. We develop a simulated annealing (SA) algorithm to solve this mod
APA, Harvard, Vancouver, ISO, and other styles
3

Boychenko, Oleg, and Ruslana Ziubina. "THE METHOD OF CALCULATION OF PROBABILITY OF REALIZATION OF THREATS OF INFORMATION WITH THE LIMITED ACCESS FROM AN INTERNAL USER VIOLATOR." Information systems and technologies security, no. 1 (1) (2019): 19–26. http://dx.doi.org/10.17721/ists.2019.1.19-26.

Full text
Abstract:
In the article analyzed regulatory documents which regulate the question of information security in the information and telecommunication system. According the results of the analysis the aim of scientific research, which consists in the improvement of method of calculation of probability of realization of threats of information with the limited access from an internal user violator was formed. To achieve this aim, a list of threats of information with limited access which could come from an internal user violator and the internal user violator model was developed. The method of calculation of
APA, Harvard, Vancouver, ISO, and other styles
4

Cui, Jianxun, Shi An, and Meng Zhao. "A Robust Model for the Network Violator Interception Problem." Arabian Journal for Science and Engineering 39, no. 10 (2014): 6871–81. http://dx.doi.org/10.1007/s13369-014-1271-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Loginova, A. O. "The Descriptive Model of Social Bot on the Base of American Political Discourse." Herald of the Siberian State University of Telecommunications and Information Science 18, no. 3 (2024): 3–13. https://doi.org/10.55648/1998-6920-2024-18-3-3-13.

Full text
Abstract:
The purpose of this study is to create a descriptive model of a social bot that takes into account its potential as a violator of information and psychological security. The study was made on the base of American political discourse. The model is based on the results of a comprehensive analysis of the unmarked text corpus of social bot posts on Twitter. The corpus of texts is a collection of texts of posts in English of social network accounts that were previously identified by researchers as social bot accounts involved in the president election campaign. The study is motivated by the lack of
APA, Harvard, Vancouver, ISO, and other styles
6

Sizov, Valerii A., Aleksei D. Kirov, and Viacheslav V. Aleinikov. "Development of models for the automated formation of competencies of a cybersecurity specialist based on a scenario approach." Journal Of Applied Informatics 18, no. 4 (2023): 76–96. http://dx.doi.org/10.37791/2687-0649-2023-18-4-76-96.

Full text
Abstract:
The work is devoted to the development of models for the automated formation of competencies of a cybersecurity specialist based on a scenario approach. The relevance of the work is determined by the need to timely update the requirements for professional competencies of a cybersecurity specialist in the context of the development of methods and tools for information warfare and the lack of a theoretical apparatus that allows automating this process. The purpose of this work is to develop models for the automated formation of competencies of a cybersecurity specialist based on a scenario appro
APA, Harvard, Vancouver, ISO, and other styles
7

Sawicki, Janusz. "Zaniechanie ukarania z art. 16a i 16b k.k.s. — szczególne rodzaje czynnego żalu czy niepotrzebna kazuistyka?" Przegląd Prawa i Administracji 116 (December 20, 2019): 87–101. http://dx.doi.org/10.19195/0137-1134.116.6.

Full text
Abstract:
WAIVING THE PENALTY WITH ARTICLE 16A AND 16B — ARE THESE SPECIAL TYPES OF ACTIVE GRIEF OR UNNECESSARY CASUISTRY?The article is a theoretical study of waiving the penalty of a fiscal penal law violator or a fiscal offender. The issues addressed in the article present major problems that draw the attention of both theorists and practitioners in the field. The aim of the article is to evaluate the contemporary model of waiving the penalty that is formulated by the fiscal penal code within Articles 16, 16a and 16b. The author analyzes in detail the institutions described in the Fiscal Penal Code,
APA, Harvard, Vancouver, ISO, and other styles
8

Kalashnikov, Andrey, and Konstantin Bugajskij. "A Model for Assessing the Security of a Complex Network (Part 1)." Voprosy kiberbezopasnosti, no. 4(50) (2022): 26–38. http://dx.doi.org/10.21681/2311-3456-2022-4-26-38.

Full text
Abstract:
Purpose of the article: development of mechanisms for evaluating the actions of agents of complex information systems from the point of view of information security. Research method: game-theoretic models using stochastic modeling methods. The result: the description of the subject area of application of the model is given, it is shown that the actions of the violator and defender can be considered from the point of view of obtaining and further escalation of access rights on the objects of the information system. It is shown that the model of information confrontation between the defender and
APA, Harvard, Vancouver, ISO, and other styles
9

Pilkevych, I. A., O. S. Boychenko, and I. V. Humeniuk. "Improvimg the Method of Developing a Logic-Probabilistic Model of an Internal Violator." Èlektronnoe modelirovanie 42, no. 4 (2020): 71–86. http://dx.doi.org/10.15407/emodel.42.04.071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhuk, R. "A Method for Determining the Potential of an Information Security Intruder and Realizable Software Vulnerabilities." Proceedings of Telecommunication Universities 7, no. 2 (2021): 95–101. http://dx.doi.org/10.31854/1813-324x-2021-7-2-95-101.

Full text
Abstract:
Currently, many methodological documents have been developed that regulate approaches to the development of models of threats to information security. for information systems that process information of a different nature. There are different methods of threat development and intruder model building proposed by information security regulators, depending on the direction of their activity. To support decision-making in the process of threat modeling, a databank of information security threats has been developed. However, there are a number of contradictions in existing approaches, while the met
APA, Harvard, Vancouver, ISO, and other styles
11

Cuddeback, Gary S., Melissa Grady, Amy Blank Wilson, Tonya Van Deinse, and Joseph P. Morrissey. "Persons With Severe Mental Illnesses and Sex Offenses: Recidivism After Prison Release." International Journal of Offender Therapy and Comparative Criminology 63, no. 12 (2019): 2157–70. http://dx.doi.org/10.1177/0306624x19842994.

Full text
Abstract:
Individuals who have committed sex offenses (ISOs) with severe mental illnesses are a complex population to serve and more research is needed to guide practice and policy, especially around community supervision, enrollment in Medicaid, housing, employment, criminal justice contacts, and reincarceration after prison reentry. To further the literature in this area, we used logistic regression to model recidivism and admissions to violator or prison facilities among 127 ISOs with severe mental illnesses and 2,935 people with severe mental illnesses who were incarcerated in prison for other crime
APA, Harvard, Vancouver, ISO, and other styles
12

Shipunova, Tatiana V. "Discoursive presentation of the violator of norms in the communicative model of social control." Vestnik of Saint Petersburg University. Sociology 10, no. 4 (2017): 441–53. http://dx.doi.org/10.21638/11701/spbu12.2017.405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Made Dwi Hadayani and Ketut Sujana. "Moderated by retaliation: Moral intensity, offender status and personal cost on auditors' intention to engage in whistleblowing." World Journal of Advanced Research and Reviews 27, no. 1 (2025): 1270–78. https://doi.org/10.30574/wjarr.2025.27.1.0905.

Full text
Abstract:
The purpose of this study is to provide empirical evidence on the influence of moral intensity, the status of the violator, and personal cost on auditors' intentions to perform whistleblowing actions, with retaliation as a moderating variable. The population in this study consists of all auditors working at the Provincial Office of BPKP (Financial and Development Supervisory Agency) in Bali and Nusa Tenggara, totaling 211 individuals. The data collection method used is a survey with a questionnaire technique. The data analysis approach applied is Partial Least Squares (PLS), which is a compone
APA, Harvard, Vancouver, ISO, and other styles
14

Maximova, E. "Cognitive Modeling of Destructive Malicious Impacts on Critical Information Infrastructure Objects." Proceedings of Telecommunication Universities 6, no. 4 (2020): 91–103. http://dx.doi.org/10.31854/1813-324x-2020-6-4-91-103.

Full text
Abstract:
The security of a subject of critical information infrastructure (CII) is one of the key issues of its life support. The current approach (legal and regulatory) regulates solutions of this issue without taking into account the influence of the violator, which can have a destructive effect on the SCII. This, in our opinion, leads to significant errors in the analysis of the information security of the CII, therefore, reduces the effectiveness of the information protection means declared information security tools for CII objects. The purpose of this work is to develop a model of an information
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Ping-Ling, Yi-Chu Chen, and Chih-Wei Pai. "Motorcyclist Is the Right-of-Way Violator: A Population-Based Study of Motorcycle Right-of-Way Crash in Taiwan." Journal of Advanced Transportation 2018 (July 17, 2018): 1–7. http://dx.doi.org/10.1155/2018/9543787.

Full text
Abstract:
The most typical and catastrophic car-motorcycle crash occurs when a car manoeuvres into the path of an approaching motorcycle at an intersection, which involves a car driver violating motorcycle’s right of way (ROW). In Taiwan, however, motorcyclists are frequently the ROW violator—they are observed to frequently infringe upon the ROW of oncoming vehicles at intersections. Such a ROW crash in which a left-turn motorcyclist crosses in front of approaching traffic appears to be a safety problem in terms of its frequency and accident consequence. Using the National Taiwan Crash Database, the pre
APA, Harvard, Vancouver, ISO, and other styles
16

Sviridov, V. V. "Methodology for Calculating the Rational Distance between Robotic Systems in Changing Conditions for Solving the Problems of Protecting Critical Facilities." Моделирование и анализ данных 11, no. 4 (2021): 33–48. http://dx.doi.org/10.17759/mda.2021110403.

Full text
Abstract:
The article discusses the method of calculating the rational distance between robotic complexes at the border of protection. The procedure, analytical model and algorithm for solving the scientific problem proposed in the methodology allow us to distinguish the moments of quantitative change in the functional capabilities of optical-electronic means of reconnaissance of robotic complexes under the influence of environmental factors and the violator, who further regulate the transition to solving the problem of adaptive group control of robotic complexes.
APA, Harvard, Vancouver, ISO, and other styles
17

Kalashnikov, Andrey, Konstantin Bugajskij, and Aleksandr Molotov. "A MODEL FOR ASSESSING THE SECURITY OF A COMPLEX NETWORK (PART 2)." Voprosy kiberbezopasnosti, no. 5(51) (2022): 47–60. http://dx.doi.org/10.21681/2311-3456-2022-5-47-60.

Full text
Abstract:
Purpose of the article: development of a mechanism for evaluating the actions of agents of complex information systems from the point of view of information security. Research method: game-theoretic models using stochastic modeling methods. The result: typical operations of the violator and defender are defined. A game-theo retic model based on a game with nature has been developed to determine the results of an attack on a separate element of a complex network. Based on the zero-sum game, a model of agent confrontation based on the resu lts of the game with nature has been developed. For the
APA, Harvard, Vancouver, ISO, and other styles
18

Boltyonkova, Elena, Andrey Andreev, and Alexander Doronin. "Development of measures to ensure information security in structural division of the university." E3S Web of Conferences 140 (2019): 08005. http://dx.doi.org/10.1051/e3sconf/201914008005.

Full text
Abstract:
In this paper we have determined the place of information security in the national security system of the Russian Federation and analyzed information processed in higher education institutions. The categorization of the processed information in the information system of the Higher School of Technosphere Safety is carried out. The estimation of the potential violator of information security is executed and an improved threat model is made, on the basis of which we have formulated practical proposals for the protection of information in the structural unit of the University.
APA, Harvard, Vancouver, ISO, and other styles
19

Drobakha, Hr, I. Neklonskyi, A. Kateshchenok, et al. "Structural and functional simulation of interaction in the field of aviation safety by using matrices." Archives of Materials Science and Engineering 2, no. 95 (2019): 74–84. http://dx.doi.org/10.5604/01.3001.0013.1734.

Full text
Abstract:
Purpose: The conducted research was aimed at constructing a structural and functional model for the interaction of bodies providing aviation safety during crisis management. Design/methodology/approach: The methods of mathematical simulation and the graph theory, the methods comparison and formalization have been applied to study the process of interaction between the bodies assuring aviation safety. Using methods of the linear algebra allowed constructing a mathematical model for the functional structure of the interaction process that contains description of this process by the main methods
APA, Harvard, Vancouver, ISO, and other styles
20

Savchenko, S. O., and N. V. Kapchuk. "ALGORITHM OF CREATION OF MODEL OF THE VIOLATOR IN THE INFORMATION SECURITY SYSTEM WITH APPLICATION OF GAME THEORY." Dynamics of Systems, Mechanisms and Machines 5, no. 4 (2017): 084–89. http://dx.doi.org/10.25206/2310-9793-2017-5-4-84-89.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Plard, Floriane, Daniel Turek, and Michael Schaub. "Consequences of violating assumptions of integrated population models on parameter estimates." Environmental and Ecological Statistics 28 (July 1, 2021): 667–95. https://doi.org/10.5281/zenodo.5644962.

Full text
Abstract:
<strong>Abstract</strong> While ecologists know that models require assumptions, the consequences of their violation become vague as model complexity increases. Integrated population models (IPMs) combine several datasets to inform a population model and to estimate survival and reproduction parameters jointly with higher precision than is possible using independent models. However, accuracy actually depends on an adequate fit of the model to datasets. We first investigated bias of parameters obtained from integrated population models when specific assumptions are violated. For instance, a mod
APA, Harvard, Vancouver, ISO, and other styles
22

Sinyuk, A. D., and O. A. Ostroumov. "UNAUTHORIZED INFORMATION RECOVERY CHANNEL MODEL." H&ES Research 13, no. 3 (2021): 60–67. http://dx.doi.org/10.36724/2409-5419-2021-13-3-60-67.

Full text
Abstract:
Large amounts of information are stored in hard disk drives. In modern information systems. Deleting files using the operating system or reformatting the magnetic drive does not delete the data. There is an opportunity to recover the data by the violator in the conditions of moving the drive from the controlled premises for disposal, sending for repair, theft, replacement, substitution, donation, etc. The known information destruction methods are not always economical and do not fully meet the reliability requirement. The modern methods selection of information recovery is carried out. During
APA, Harvard, Vancouver, ISO, and other styles
23

Kasetsomboon, Pemika. "Nora Tang Ke." Asian Journal of Arts and Culture 21, no. 2 (2021): 62–70. http://dx.doi.org/10.48048/ajac.2021.247809.

Full text
Abstract:
Rum Tang Ke is part of the Nora Rong Khru ritual performed on the last day called “Song Khru day” (Teacher’s departure day). A crocodile model used in the ritual portrays evil and misfortunes. In a strict sequence, Rum Klong Hong (swan lassoing dance) must preceded Rum Tang Ke in order to be granted talisman’s blessing as a protection against evil and misfortune from the crocodile. After Rum Klong Hong, Rum Tang Ke comprising seven performers together with one Nora Yai (Head of Nora) who will be the first to stab the crocodile. After that, each of the seven will take turn dancing toward the cr
APA, Harvard, Vancouver, ISO, and other styles
24

Akpalu, Wisdom, and Ametefee K. Normanyo. "Illegal fishing and catch potentials among small-scale fishers: application of an endogenous Switching regression model." Environment and Development Economics 19, no. 2 (2013): 156–72. http://dx.doi.org/10.1017/s1355770x13000478.

Full text
Abstract:
AbstractCapture fish stocks are facing an increasing threat of extinction, partly due to the use of illegal fishing methods. In developing coastal countries – where fishing activities are the mainstay of the population along the coast – livelihoods are being directly threatened. Although a number of studies exist on fishing regulations and those who violate them, little has been done on the relationship between intrinsic catch potentials/fishing skills and illegal fishing behavior. Using data on violations of light attraction regulation among small-scale fishers in Ghana, our results show that
APA, Harvard, Vancouver, ISO, and other styles
25

Patil, Mayuri Manikrao, Snehal Nimba Nikumbh, and Aparna Parshwanath Parigond. "Fake Product Monitoring and Removal for Genuine Product Feedback." International Journal of Emerging Science and Engineering 7, no. 1 (2021): 1–3. http://dx.doi.org/10.35940/ijese.a2494.037121.

Full text
Abstract:
A customer’s decision to purchase a product or service are primarily influenced by online reviews. Customers use online reviews, which are valuable sources of information to understand the public opinion on products and/or services. Dependability on online reviews can give rise to the potential concern that violator could give deceitful reviews in order to synthetically promote or decry products and services. This practice is known as Opinion Spam, where spammers manipulate reviews by making fake, untruthful, or deceptive reviews to get profit and boost their products, and devalue a competitor
APA, Harvard, Vancouver, ISO, and other styles
26

Mayuri, Manikrao Patil, Nimba Nikumbh Snehal, Parshwanath Parigond Aparna, and Patil Madhavi. "Fake Product Monitoring and Removal for Genuine Product Feedback." International Journal of Emerging Science and Engineering (IJESE) 7, no. 1 (2021): 1–3. https://doi.org/10.35940/ijese.A2494.037121.

Full text
Abstract:
A customer&rsquo;s decision to purchase a product or service are primarily influenced by online reviews. Customers use online reviews, which are valuable sources of information to understand the public opinion on products and/or services. Dependability on online reviews can give rise to the potential concern that violator could give deceitful reviews in order to synthetically promote or decry products and services. This practice is known as Opinion Spam, where spammers manipulate reviews by making fake, untruthful, or deceptive reviews to get profit and boost their products, and devalue a comp
APA, Harvard, Vancouver, ISO, and other styles
27

Tsurikov, Vladimir Ivanovich, and Elena Matveevna Skarzhinskaya. "To the theory of collective actions. Part 4. Use of violence potential." Теоретическая и прикладная экономика, no. 2 (February 2020): 86–95. http://dx.doi.org/10.25136/2409-8647.2020.2.30246.

Full text
Abstract:
The subject of this research is opportunities for effective use of human capital members of the collective in the conditions of self-governance and self-organization resources. It is assumed that members of the collective are capable to jointly create an additional cost by making individual efforts. Value of the expected gross income increases with the efforts put by each agent, and subordinated to the law of diminishing returns. The goal of each member of the collective consists in maximization of the own individual profit. Achievement of the socially optimal level of applied efforts requires
APA, Harvard, Vancouver, ISO, and other styles
28

Kulikovskij, Dmitriy O., and Daria N. Khalina. "Analysis creation process of a secure enterprise information system." Digital technology security, no. 4 (December 25, 2023): 35–46. http://dx.doi.org/10.17212/2782-2230-2023-4-35-46.

Full text
Abstract:
The article is an analysis of the key stages of the development of a secure enterprise information system. The focus is on highlighting the stages of determining information security objectives, risk assessment, vulnerability identification, as well as the process of making informed decisions in the context of information system security. The article provides detailed recommendations for creating reports on the completed risk analysis and the process of making informed decisions based on the results obtained. As part of the work, the analysis of the processes of compiling a matrix of the proba
APA, Harvard, Vancouver, ISO, and other styles
29

Manhas, Saloni, Swapnesh Taterh, and Dilbag Singh. "Deep Q learning-based mitigation of man in the middle attack over secure sockets layer websites." Modern Physics Letters B 34, no. 32 (2020): 2050366. http://dx.doi.org/10.1142/s0217984920503662.

Full text
Abstract:
To ensure the security of web applications and to reduce the constant risk of increasing cybercrime, basic security principles like integrity, confidentiality and availability should not be omitted. Even though Transport Layer Security/Secure Socket Layer (TLS/SSL) authentication protocols are developed to shield websites from intruders, these protocols also have their fair share of problems. Incorrect authentication process of websites can give birth to notorious attack like Man in The Middle attack, which is widespread in HTTPS websites. In MITM attack, the violator basically positions himse
APA, Harvard, Vancouver, ISO, and other styles
30

Hardipo Widyaputra, Sholahudin Ranggawuni, and Pujiyono SH MH. "The Enforcement of Simple Claim Process as a Role Model of Credit Agreement Conflict Resolution in Bank Perkreditan Rakyat (BPR)." International Journal of Multicultural and Multireligious Understanding 5, no. 4 (2018): 394. http://dx.doi.org/10.18415/ijmmu.v5i4.360.

Full text
Abstract:
This study is aimed to know varied factors influencing simple claim has not become role modelof credit conflict resolution in BPR. Research method is normative juridic. Data collection technique is documentary/literature study and books or other related documents with the case under study. Results of the research shown that several factors are influencing the simple claim not to be role model of credit conflict resolution in BPR because the non existence of regulation on simple claim to be the only legal effort in the resolution of credit conflict in UMKM. In addition, people feels that simple
APA, Harvard, Vancouver, ISO, and other styles
31

Artyushina, L. A. "A PROBABILISTIC APPROACH TO ASSESSING THE SECURITY OF THE INFORMATION SYSTEM IN THE PROBLEM OF USER IDENTIFICATION BY KEYPAD HANDWRITING." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 23, no. 2 (2023): 93–101. http://dx.doi.org/10.14529/ctcr230208.

Full text
Abstract:
The purpose of the study. Assessment of IP security in the process of user identification by keyboard handwriting. Materials and methods. The study and analysis of scientific publications on the problem of assessing the security of information systems allowed us to identify the most effective approach to assessing the security of an information system based on attack modeling. The method considered in the article is a combination of graphical and probabilistic approaches to the analysis of possible scenarios for the implementation of threats in information systems for the case of user identifi
APA, Harvard, Vancouver, ISO, and other styles
32

Kuznetsov, Dmitry. "Functions of compensation for human rights violation in international and national judicial decisions." Meždunarodnoe pravosudie 11, no. 1 (2021): 81–101. http://dx.doi.org/10.21128/2226-2059-2021-1-81-101.

Full text
Abstract:
When establishing human rights violations committed by the state, should it be violation of internationally protected rights or constitutional rights, the violator is obliged to compensate for the harm caused. In the meantime, neither international sources, nor national legal acts and case law answer the question whether the obligation to compensate is exhausted by the compensation awarded in accordance with a decision of an international judicial body or such a payment has punitive nature, and the state keeps the obligation to compensate the damage within the frameworks of national proceeding
APA, Harvard, Vancouver, ISO, and other styles
33

Shcheblanin, Yury, and Dmytro Rabchun. "MATHEMATICAL MODEL OF INFORMATION SECURITY’S THEAT AGENT." Cybersecurity: Education, Science, Technique, no. 1 (2018): 63–72. http://dx.doi.org/10.28925/2663-4023.2018.1.6372.

Full text
Abstract:
To provide information security in automated control systems, the construction of an effective system of information security, it was not enough to identify channels of information leakage, to analyze the possible threats, the consequences of their implementation and estimate the losses. It is necessary to imagine an offender even better. An offender model is one of the most important components of a possible scenario for unlawful actions on access to information. The existence of such a model of a security breach, which is constantly corrected on the basis of obtaining new knowledge about the
APA, Harvard, Vancouver, ISO, and other styles
34

Dementiev, A. S., and N. A. Tsvetkova. "Justice sensitivity of youth with different levels of income as an actual socio-psychological problem." Vestnik Universiteta, no. 10 (December 6, 2024): 196–204. https://doi.org/10.26425/1816-4277-2024-10-196-204.

Full text
Abstract:
The article substantiates the relevance of studying the socio-psychological determinants of sensitivity to justice in Russian youth with different levels of wealth. The sensitivity to justice concept itself has been revealed, its structure presented and its evolution shown; the wealth concept has been given. Four roles that a person can occupy in situations subjectively perceived as unfair (a ‘victim’ – the injustice is committed towards them; a ‘witness’ – they observe injustice towards another people; a ‘beneficiary’ – a person benefits from the situation of injustice towards another one; a ‘v
APA, Harvard, Vancouver, ISO, and other styles
35

Agresti, Iris, Gonzalo Carvacho, Davide Poderini, Leandro Aolita, Rafael Chaves, and Fabio Sciarrino. "Experimental Connection between the Instrumental and Bell Inequalities." Proceedings 12, no. 1 (2019): 27. http://dx.doi.org/10.3390/proceedings2019012027.

Full text
Abstract:
An investigated process can be studied in terms of the causal relations among the involved variables, representing it as a causal model. Some causal models are particularly relevant, since they can be tested through mathematical constraints between the joint probability distributions of the observables. This is a valuable tool because, if some data violates the constraints of a causal model, the implication is that the observed statistics is not compatible with that causal structure. Strikingly, when non-classical correlations come to play, a discrepancy between classical and quantum causal pr
APA, Harvard, Vancouver, ISO, and other styles
36

Ладанов, В. И., Е. В. Шарипова, and С. М. Леготкина. "Civil liability of the parties in entrepreneurial activity for non-performance or improper performance option agreements." Экономика и предпринимательство, no. 11(124) (December 23, 2020): 1183–86. http://dx.doi.org/10.34925/eip.2020.124.11.233.

Full text
Abstract:
Участники экономико-правового оборота, осуществляющие предпринимательскую деятельность, в определенный период времени сталкиваются с экономической неопределенностью и зачастую, при гибкости товарного рынка, не могут определить тот объем товара, размер оказываемых услуг или результатов работ, который им потребуется в будущем. Опционные соглашения в такой ситуации, играют особенную роль. Рассматривая модель опционного договора в предпринимательской деятельности, у многих исследователей возникают вопросы относительно того, почему данная конструкция договора закреплена в общей части Гражданского к
APA, Harvard, Vancouver, ISO, and other styles
37

AL-Ghazali, Malik. "Restorative Justice Approach on The Under Age (Minors) Violator of The Traffic Case Accident (Laka) That Lead to Death in Polres Majalengka." Jurnal Daulat Hukum 1, no. 3 (2018): 705. http://dx.doi.org/10.30659/jdh.v1i3.3371.

Full text
Abstract:
The research is qualitative research in the form of descriptive analysis using sociological juridical approach. Types and sources of data used are primary data and secondary data. Data collected through the study of literature and interviews, while the juridical analysis using qualitative analysis. The approach used for the treatment of children in conflict with the law based on values, principles and norms. Pure approach puts the welfare and well-being approach to legal intervention. The punishment model approach to restorative justice called today considered more feasible. For the sake of fr
APA, Harvard, Vancouver, ISO, and other styles
38

Shevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Sofia Boiko. "GAME THEORETICAL APPROACH TO THE MODELING OF CONFLICTS IN INFORMATION SECURITY SYSTEMS." Cybersecurity: Education, Science, Technique 2, no. 22 (2023): 168–78. http://dx.doi.org/10.28925/2663-4023.2023.22.168178.

Full text
Abstract:
The increase in the number and complexity of cyber threats forces us to study not only the technical aspects of cyber security, but also the social and interaction between participants in the digital space. The game-theoretic approach opens up opportunities for a deeper understanding of emerging conflicts and the development of effective management strategies to ensure cyber security. In this context, it is important to investigate how game theory can be applied to the analysis of conflicts in cyberspace and what practical conclusions can be drawn for the improvement of cyber security systems
APA, Harvard, Vancouver, ISO, and other styles
39

Samoylenko, Georgiy, and Dmytro Kosyrev. "Protection of housing rights of Ukrainian citizens in conditions of armed aggression of the Russian Federation against Ukraine." Scientific and informational bulletin of Ivano-Frankivsk University of Law named after King Danylo Halytskyi, no. 17(29) (June 12, 2024): 204–14. http://dx.doi.org/10.33098/2078-6670.2024.17.29.204-214.

Full text
Abstract:
Purpose: the purpose of the article is to determine and justify the choice of the optimal model of civil-legal protection of housing rights in the event of their violation, which is caused or is a direct consequence of the armed aggression of the Russian Federation against Ukraine. The methodology includes a comprehensive analysis and generalization of the available scientific and theoretical material and the formulation of relevant conclusions and recommendations. The work uses general scientific and special methods of scientific knowledge: dialectics, induction and deduction, system-structur
APA, Harvard, Vancouver, ISO, and other styles
40

Miasoiedova, A., M. Divizinyuk, A. Khmyrova, R. Shevchenko, and O. Shevchenko. "MATHEMATICAL MODEL OF DETECTION OF SMALL UNMANNED AERIAL VEHICLES USING ACTIVE OPTICAL SYSTEMS." Municipal economy of cities 1, no. 175 (2023): 176–81. http://dx.doi.org/10.33042/2522-1809-2023-1-175-176-181.

Full text
Abstract:
The work is devoted to the solution of an actual scientific task in the field of civil protection, namely, the development of a new model for the prevention of emergency situations of a terrorist nature at the objects of the critical infrastructure of Ukraine, which are protected, by means of timely detection and identification of small unmanned aerial vehicles by active optoelectronic means. Based on the analysis, it was established that one of the trends in the development of terrorist scenarios at protected critical infrastructure facilities is the use of various small manned and unmanned a
APA, Harvard, Vancouver, ISO, and other styles
41

Lin, Chilong. "BAU Production in the SN-Breaking Standard Model." Symmetry 15, no. 5 (2023): 1051. http://dx.doi.org/10.3390/sym15051051.

Full text
Abstract:
The violation of charge-parity symmetry and the baryon asymmetry of the universe are two of the most significant unresolved problems in physics. This article presents further research on the CP violation problem in the Standard Model with 32 candidate sets of the 10 “natural” parameters that exhibit the same Cabibbo–Kobayashi–Maskawa performance. These parameters are considered “natural” because they consist solely of the Yukawa couplings and the vacuum expectation value of the unique Higgs doublet in the Standard Model. Then, the problems of CP violation and the baryon asymmetry of the univer
APA, Harvard, Vancouver, ISO, and other styles
42

Kurniawati, Yenni, Anang Kurnia, and Kusman Sadik. "A COMPARISON OF POLYTOMOUS MODEL WITH PROPORTIONAL ODDS AND NON-PROPORTIONAL ODDS MODEL ON BIRTH SIZE CASE IN INDONESIA." MEDIA STATISTIKA 14, no. 1 (2021): 79–88. http://dx.doi.org/10.14710/medstat.14.1.79-88.

Full text
Abstract:
The proportional odds model (POM) and the non-proportional odds model (NPOM) are very useful in ordinal modeling. However, the proportional odds assumption is often violated in practice. In this paper, the non-proportional odds model is chosen as an alternative model when the proportional odds assumption is not violated. This paper aims to compare Proportional Odds Model (POM) and Non-Proportional Odds Model (NPOM) in cases of birth size in Indonesia based on the 2017 Indonesian Demographic and Health Survey (IDHS) data. The results showed that in the POM there was a violation of the proportio
APA, Harvard, Vancouver, ISO, and other styles
43

Xiao, Yun, Haoyun Liu, and Zijun Liang. "An Analysis of the Influential Factors of Violations in Urban-Rural Passenger Transport Drivers." Journal of Advanced Transportation 2022 (April 30, 2022): 1–10. http://dx.doi.org/10.1155/2022/1652923.

Full text
Abstract:
Road passenger transport is important for keeping urban and rural areas connected. In order to explore the traffic safety mechanisms behind urban and rural passenger transport, the personal attributes of urban-rural bus drivers from different areas were investigated. Based on the binary logistic regression model, an impact analysis model of 14 indicators of bus driver violations was established. The results showed that personality, gender, bus route, road conditions, and nap habits were important factors that affect driver violations. Female drivers violated slightly more (27.7%) than male dri
APA, Harvard, Vancouver, ISO, and other styles
44

Shor, Oded, Felix Benninger, and Andrei Khrennikov. "Dendrogramic Representation of Data: CHSH Violation vs. Nonergodicity." Entropy 23, no. 8 (2021): 971. http://dx.doi.org/10.3390/e23080971.

Full text
Abstract:
This paper is devoted to the foundational problems of dendrogramic holographic theory (DH theory). We used the ontic–epistemic (implicate–explicate order) methodology. The epistemic counterpart is based on the representation of data by dendrograms constructed with hierarchic clustering algorithms. The ontic universe is described as a p-adic tree; it is zero-dimensional, totally disconnected, disordered, and bounded (in p-adic ultrametric spaces). Classical–quantum interrelations lose their sharpness; generally, simple dendrograms are “more quantum” than complex ones. We used the CHSH inequalit
APA, Harvard, Vancouver, ISO, and other styles
45

Sen, Indrajit, and Antony Valentini. "Superdeterministic hidden-variables models I: non-equilibrium and signalling." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 476, no. 2243 (2020): 20200212. http://dx.doi.org/10.1098/rspa.2020.0212.

Full text
Abstract:
This is the first of two papers that attempt to comprehensively analyse superdeterministic hidden-variables models of Bell correlations. We first give an overview of superdeterminism and discuss various criticisms of it raised in the literature. We argue that the most common criticism, the violation of ‘free-will’, is incorrect. We take up Bell’s intuitive criticism that these models are ‘conspiratorial’. To develop this further, we introduce non-equilibrium extensions of superdeterministic models. We show that the measurement statistics of these extended models depend on the physical system u
APA, Harvard, Vancouver, ISO, and other styles
46

ICHINOSE, SHOICHI. "CP VIOLATION FROM A HIGHER DIMENSIONAL MODEL." International Journal of Modern Physics E 16, no. 05 (2007): 1557–70. http://dx.doi.org/10.1142/s0218301307006885.

Full text
Abstract:
It is shown that Randall–Sundrum model has the EDM term which violates the CP-symmetry. The comparison with the case of Kaluza–Klein theory is done. The chiral property, localization, anomaly phenomena are examined. We evaluate the bulk quantum effect using the method of the induced effective action. This is a new origin of the CP-violation.
APA, Harvard, Vancouver, ISO, and other styles
47

Myranika, Annie. "Law enforcement of criminal acts of traffic violations." International journal of social sciences and humanities 6, no. 1 (2022): 66–74. http://dx.doi.org/10.53730/ijssh.v6n1.3829.

Full text
Abstract:
The purpose of this research is to find out: (1). A new idea in the application of a traffic violation settlement model. (2). The settlement model for traffic violations is given proof violation. (3). The new traffic violation crime model in the form of a SIM or STNK was not confiscated by officers, but an ID card as collateral. (4). Violators pay the ticket via ATM, internet banking, and phone banking. This research method uses descriptive qualitative. Data collection techniques are in-depth interviews, field surveys which are analyzed as data, literature studies in the form of notes, videos,
APA, Harvard, Vancouver, ISO, and other styles
48

Lenkov, Sergey, Volodymyr Dzhuliy, Ihor Muliar, and Maksym Dymbovsky. "Model of current threats to security of confiden-tial data in divisional information systems." Pidvodni tehnologii, no. 13 (February 29, 2024): 45–59. http://dx.doi.org/10.32347/uwt.2023.13.1205.

Full text
Abstract:
The paper proposes a model for determining actual threats to the information security of distributed information systems, based on algorithms of fuzzy inference and the theory of fuzzy neural systems, unlike known ones, uses sufficient and necessary indicators, excludes expert errors, increases the detection of the number of actual threats to information security of distributed systems by 5 %, reduces the cost of purchasing information protection equipment from 15 to 30%. It takes into account the following factors: the IT infrastructure of the distributed information system, the capabilities
APA, Harvard, Vancouver, ISO, and other styles
49

NEUFELD, H., W. GRIMUS, and G. ECKER. "GENERALIZED CP INVARIANCE, NEUTRAL FLAVOR CONSERVATION AND THE STRUCTURE OF THE MIXING MATRIX." International Journal of Modern Physics A 03, no. 03 (1988): 603–16. http://dx.doi.org/10.1142/s0217751x88000254.

Full text
Abstract:
CP invariance of SU (2)L× U (1) gauge theories is formulated in the most general way. Certain useful standard forms for CP transformations are presented. After a review of horizontal symmetries inducing neutral flavor conservation, we discuss a toy model where CP invariance enforces neutral flavor conservation in a nontrivial way. It is shown that spontaneous CP violation in its general form and neutral flavor conservation lead to a real mixing matrix for three generations. For more than three generations, the mixing matrix may violate CP. A complete analysis of the possible mixing matrices fo
APA, Harvard, Vancouver, ISO, and other styles
50

Couth, Samuel, Emma Gowen, and Ellen Poliakoff. "Using Race Model Violation to Explore Multisensory Responses in Older Adults: Enhanced Multisensory Integration or Slower Unisensory Processing?" Multisensory Research 31, no. 3-4 (2018): 151–74. http://dx.doi.org/10.1163/22134808-00002588.

Full text
Abstract:
Older adults exhibit greater multisensory reaction time (RT) facilitation than young adults. Since older adults exhibit greater violation of the race model (i.e., cumulative distribution functions for multisensory RTs are greater than that of the summed unisensory RTs), this has been attributed to enhanced multisensory integration. Here we explored whether (a) individual differences in RT distributions within each age group might drive this effect, and (b) the race model is more likely to be violated if unisensory RTs are slower. Young () and older adults () made speeded responses to visual, a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!