Typical «effect-costs» dependence function for information security
DOI:
https://doi.org/10.18372/2225-5036.21.8317Keywords:
information security, information security object, logistic function «effect of expenses», interpolation, expert evaluationAbstract
Information security is a complex system. For management objectives formalization of such system and choosing a suitable method for its solution should be formulated analytical form of function «effect-costs». In this paper, the method of stepwise logistic exponential interpolation nonconvex functions «effect-costs», which gives the most probable in comparison with known methods, depending on the degree of integer argument for a broad class of optimal resource allocation between objects of information security that effectively solved dynamic programming method. Providing analytical form of «productive» functions «effect-costs» for information security facilities necessary for the formal objectives of management «complex» system, which is information security obtained results allow to formalize directions for further research to develop new effective information security systems.References
Педченко Г.М., Шарий В.І., Невольніченко А.І. Воєнно-наукове забезпечення операцій військ (сил):
монографія. – К. : КНУ імені Тараса Шевченка, видання Військового Інституту, 2011. – 228 с.
Невольніченко А.І. Ефективність автома-тизованого управління військами (силами): монографія. – К. : КНУ імені Тараса Шевченка, видання Військового Інституту, 2013. – 355 с.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.