Mathematical model for selecting a contractor to assess information security risks

Download article in PDF format

Authors: Koltays A. S., Shatrova A. A., Shelupanov A. A.

Annotation: The article deals with the main methods used to construct a mathematical model for assessing the welfare of the counterparty. The formats of data transformation are described in order to use them when modeling, as well as the requirements to the model. The dependence between input data was checked to exclude equal attributes from the model. The main difficulties in assessing the accuracy and completeness of the model were identified. The use of cross-validation to eliminate the difficulties in model building was described. The developed model gives an accurate result with a small number of compared counterparties, that corresponds to the checking order of the counterparty in the real system.

Keywords: model, dependability, risks, information-analytical systems, machine training

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates