Mathematical model for selecting a contractor to assess information security risks
Download article in PDF format
Authors: Koltays A. S., Shatrova A. A., Shelupanov A. A.
Annotation: The article deals with the main methods used to construct a mathematical model for assessing the welfare of the counterparty. The formats of data transformation are described in order to use them when modeling, as well as the requirements to the model. The dependence between input data was checked to exclude equal attributes from the model. The main difficulties in assessing the accuracy and completeness of the model were identified. The use of cross-validation to eliminate the difficulties in model building was described. The developed model gives an accurate result with a small number of compared counterparties, that corresponds to the checking order of the counterparty in the real system.
Keywords: model, dependability, risks, information-analytical systems, machine training