METHOD FOR CALCULATING THE INFORMATION SECURITY INDICATOR IN SOCIAL MEDIA WITH CONSIDERATION OF THE PATH DURATION BETWEEN CLIENTS
Article Sidebar
Open full text
Issue Vol. 14 No. 1 (2024)
-
SOME MORE ON LOGARITHMIC SINGULARITY INTEGRATION IN BOUNDARY ELEMENT METOD
Tomasz Rymarczyk, Jan Sikora5-10
-
ЕLECTROMAGNETIC FIELD EQUATIONS IN NONLINEAR ENVIRONMENT
Viktor Lyshuk, Vasyl Tchaban, Anatolii Tkachuk, Valentyn Zablotskyi, Yosyp Selepyna11-16
-
OPTICAL SPECKLE-FIELD VISIBILITY DIMINISHING BY REDUCTION OF A TEMPORAL COHERENCE
Mikhaylo Vasnetsov, Valeriy Voytsekhovich, Vladislav Ponevchinsky, Nataliia Kachalova, Alina Khodko, Oleksanr Mamuta, Volodymyr Pavlov, Vadym Khomenko, Natalia Manicheva17-20
-
QUALITY INDICATORS OF DETECTION OF SIDE RADIATION SIGNALS FROM MONITOR SCREENS BY A SPECIALIZED TECHNICAL MEANS OF ENEMY INTELLIGENCE
Dmytro Yevgrafov, Yurii Yaremchuk21-26
-
THE IMPACT OF LIGHTNING STRIKE ON HYBRID HIGH VOLTAGE OVERHEAD TRANSMISSION LINE – INSULATED GAS LINE
Samira Boumous, Zouhir Boumous, Yacine Djeghader27-31
-
ENERGY EFFICIENCY OF PHOTOVOLTAIC PANELS DEPENDING ON THE STEP RESOLUTION OF TRACKING SYSTEM
Kamil Płachta32-36
-
DIGITAL IMAGE RESTORATION USING SURF ALGORITHM
Shanmukhaprasanthi Tammineni, Swaraiya Madhuri Rayavarapu, Sasibhushana Rao Gottapu, Raj Kumar Goswami37-40
-
TENSOR AND VECTOR APPROACHES TO OBJECTS RECOGNITION BY INVERSE FEATURE FILTERS
Roman Kvуetnyy, Yuriy Bunyak, Olga Sofina, Volodymyr Kotsiubynskyi, Tetiana Piliavoz, Olena Stoliarenko, Saule Kumargazhanova41-45
-
ARCHITECTURAL AND STRUCTURAL AND FUNCTIONAL FEATURES OF THE ORGANIZATION OF PARALLEL-HIERARCHICAL MEMORY
Leonid Timchenko, Natalia Kokriatska, Volodymyr Tverdomed, Iryna Yepifanova, Yurii Didenko, Dmytro Zhuk, Maksym Kozyr, Iryna Shakhina46-52
-
SIMULATION AND COMPUTER MODELING OF BRIDGE STRUCTURES DYNAMICS USING ANSYS
Anzhelika Stakhova, Adrián Bekö53-56
-
ENHANCING CROP HEALTH THROUGH DIGITAL TWIN FOR DISEASE MONITORING AND NUTRIENT BALANCE
Sobhana Mummaneni, Tribhuvana Sree Sappa, Venkata Gayathri Devi Katakam57-62
-
REVIEW OF MODELLING APPROACHES FOR WEBSITE-RELATED PREDICTIONS
Patryk Mauer63-66
-
FORMATION OF HIGHLY SPECIALIZED CHATBOTS FOR ADVANCED SEARCH
Andrii Yarovyi, Dmytro Kudriavtsev67-70
-
METHOD FOR CALCULATING THE INFORMATION SECURITY INDICATOR IN SOCIAL MEDIA WITH CONSIDERATION OF THE PATH DURATION BETWEEN CLIENTS
Volodymyr Akhramovych, Yuriy Pepa, Anton Zahynei, Vadym Akhramovych, Taras Dzyuba, Ihor Danylov71-77
-
CORRESPONDENCE MATCHING IN 3D MODELS FOR 3D HAND FITTING
Maksym Tymkovych, Oleg Avrunin, Karina Selivanova, Alona Kolomiiets, Taras Bednarchyk, Saule Smailova78-82
-
GENETIC ALGORITHM-BASED DECISION TREE OPTIMIZATION FOR DETECTION OF DEMENTIA THROUGH MRI ANALYSIS
Govada Anuradha, Harini Davu, Muthyalanaidu Karri83-89
-
MEDICAL FUZZY-EXPERT SYSTEM FOR PREDICTION OF ENGRAFTMENT DEGREE OF DENTAL IMPLANTS IN PATIENTS WITH CHRONIC LIVER DISEASE
Vitaliy Polishchuk, Sergii Pavlov, Sergii Polishchuk, Sergii Shuvalov, Andriy Dalishchuk, Natalia Sachaniuk-Kavets’ka, Kuralay Mukhsina, Abilkaiyr Nazerke90-94
-
ROOT SURFACE TEMPERATURE MEASUREMENT DURING ROOT CANAL OBTURATION
Les Hotra, Oksana Boyko, Igor Helzhynskyy, Hryhorii Barylo, Pylyp Skoropad, Alla Ivanyshyn, Olena Basalkevych95-98
-
EVALUATING THE FEASIBILITY OF THERMOGRAPHIC IMAGES FOR PREDICTING BREAST TUMOR STAGE USING DCNN
Zakaryae Khomsi, Mohamed El Fezazi, Achraf Elouerghi, Larbi Bellarbi99-104
-
A COMPREHENSIVE STUDY: INTRACRANIAL ANEURYSM DETECTION VIA VGG16-DENSENET HYBRID DEEP LEARNING ON DSA IMAGES
Sobhana Mummaneni, Sasi Tilak Ravi, Jashwanth Bodedla, Sree Ram Vemulapalli, Gnana Sri Kowsik Varma Jagathapurao105-110
-
DEFORMATIONS OF SOIL MASSES UNDER THE ACTION OF HUMAN-INDUCED FACTORS
Mykola Kuzlo, Viktor Moshynskyi, Nataliia Zhukovska, Viktor Zhukovskyy111-114
-
RUNNING A WORKFLOW WITHOUT WORKFLOWS: A BASIC ALGORITHM FOR DYNAMICALLY CONSTRUCTING AND TRAVERSING AN IMPLIED DIRECTED ACYCLIC GRAPH IN A NON-DETERMINISTIC ENVIRONMENT
Fedir Smilianets, Oleksii Finogenov115-118
-
INTELLIGENT DATA ANALYSIS ON AN ANALYTICAL PLATFORM
Dauren Darkenbayev, Arshyn Altybay, Zhaidargul Darkenbayeva, Nurbapa Mekebayev119-122
Archives
-
Vol. 15 No. 3
2025-09-30 24
-
Vol. 15 No. 2
2025-06-27 24
-
Vol. 15 No. 1
2025-03-31 26
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
Main Article Content
DOI
Authors
Abstract
Heterogeneous differential dependencies of the information security indicator (HDISI) in social media (SM) were analyzed, taking into account the duration of the path between clients (UDPC). The resilience of the information security indicator system (RSIIS) was also determined. The HDISI in SM was developed based on UDPC conditions. It uses modern methods and techniques, including a non-specific method. The conditions of a fixed precondition were formed according to the time grid. This dependency provides a comprehensive explanation of how the previous transformation is replaced by the elapsed period. SM is a set of clients and their types of communication. Clients can be individuals, populations, settlements, or countries. Communication is understood as more than just the transmission and receipt of information. It also includes interaction, the exchange of knowledge and expertise, and discussion. Under the angle of mathematics, the HDISI model based on non-homogeneous differential equations (NDE) was analyzed and its transcendental study was done. The transcendental study of nonlinear HDISI models in SM showed that the characteristics of UDPC significantly affect the information security indicator (ISI) - up to one hundred percent. Phase diagrams (PDs) of ISI were studied, which indicate the highest ISI even at the maximum parameters of malicious actions. For the first time, the analysis of designed HDISI structures was carried out and numerical criteria between the capabilities of UDPC and the measures of ISI, as well as the highest ISI, were obtained, which shows the scientific content of this article.
Keywords:
References
Akhramovych V. et al.: Devising a Procedure to Determine the Level of Informational Space Security in Social Networks Considering Interrelations Among Users. Eastern-European Journal of Enterprise Technologies 1 (9(115)), 2022, 63–74. DOI: https://doi.org/10.15587/1729-4061.2022.252135
Akhramovych V.: Method of Calculation of Protection of Information from the Average Length of the Road Between Users in Social Networks. Collection Information Technology and Security 10(2), 2022, 153–164. DOI: https://doi.org/10.20535/2411-1031.2022.10.2.270403
Gubanov D., Chkhartishvili A.: A Conceptual Approach to the Analysis of Online Social Networks. Large-Scale Systems Control 45, 2013, 222–236.
Hanneman R., Riddle M.: Introduction to Social Network Methods [https://faculty.ucr.edu/~hanneman/nettext/C7_Connection.html#distance].
Khrashchevskyi R. et al.: Method of Calculating Information Protection from Mutual Influence of Users in Social Networks. International Journal of Computer Network and Information Security – IJCNIS 15(5), 2023, 27–40 [https://doi.org/10.5815/ijcnis.2023.05.03]. DOI: https://doi.org/10.5815/ijcnis.2023.05.03
Nosouhi M. R.: Location Privacy Protection in Social Networks. Ph.D. thesis. University of Technology Sydney, Sydney 2020 [http://hdl.handle.net/10453/143934].
Rohloff K.: Stochastic Behavior of Random Constant Scanning Worms. The 14th ICCCN, 2005, 339–344.
Savchenko V. et al.: Method of Calculation of Information Protection from Clusterization Ratio in Social Networks. Proceedings of the 3rd International Conference on Information Security and Information Technologies – ISecIT 2021, 24–31. DOI: https://doi.org/10.1109/ATIT54053.2021.9678599
Savchenko V. et al.: Methodology for Calculating Information Protection from Parameters of its Distribution in Social Networks. 3rd International Conference on Advanced Trends in Information Theory – ATIT, 99–105.
Seyyed M. S. et al.: Privacy Protection Scheme for Mobile Social Network. Journal of King Saud University – Computer and Information Sciences 34(7), 2022, 4062–4074. DOI: https://doi.org/10.1016/j.jksuci.2022.05.011
Shehab M. et al.: Access Control for Online Social Networks Third Party Applications. Computers & Security 31(8), 2012, 897–911. DOI: https://doi.org/10.1016/j.cose.2012.07.008
Trubetskoy D. I.: Introduction to Synergetics. Chaos and structures. Editorial, Moscow 2004.
Yating L. et al.: Intelligent Privacy Protection of End User in Long Distance Education. Mobile Networks and Applications 27, 2022, 1162–1173. DOI: https://doi.org/10.1007/s11036-022-01950-6
Yevseiev S. et al.: Modeling the Protection of Personal Data from Trust and the Amount of Information on Social Networks. Eureka Physics and Engineering 13(1), 2021, 24–31. DOI: https://doi.org/10.21303/2461-4262.2021.001615
Yüksel A. S., Halim Zaim A.: A Reputation-based Privacy Management System for Social Networking Sites. Turkish Journal of Electrical Engineering and Computer Sciences 21(3), 2015, 766–784.
Zan Y., Wu J., Li P., Yu Q.: SICR Rumor Spreading Model in Complex Networks: Counterattack and Self-resistance. Physics A: Statistical Mechanics and its Applications 405, 2014, 159–170. DOI: https://doi.org/10.1016/j.physa.2014.03.021
Zhang Y., Pang J.: Distance and Friendship: A Distance-based Model for Link Prediction in Social Networks [https://satoss.uni.lu/members/jun/papers/APWeb15.pdf].
Zhang Y., Zhu J.: Stability Analysis of I2S2R Rumor Spreading Model in Complex Networks. Physics A: Statistical Mechanics and its Applications 503, 2018, 862–881. DOI: https://doi.org/10.1016/j.physa.2018.02.087
Article Details
Abstract views: 208
Volodymyr Akhramovych, State University of Information and Communication Technologies, Department of Information and Cybersecurity Systems
Doctor of Technical Science, Professor , Associate Professor, Department of Information and Cybersecurity Systems of the State University of Information and Communication Technologies, Kyiv, Ukraine. Teaches the following disciplines:
- Methods of receiving and processing signals in information security systems;
- Cyber security of banking and commercial structures;
- Theory of information resources protection with limited access;
- Licensing, certification and certification in the security field of information activity objects;
- Organization of science and research.
Over 200 scientific papers have been published, 13 of it are the USSR copyright certificates, 14 patents of Russia. The sole author of four textbooks, co-authored with two textbooks and three workshops.
He has been working in the field of higher education for more than thirty years.
Yuriy Pepa, State University of Information and Communication Technologies, Department of Robotics and Technical Systems
Candidate of technical sciences, Head of the Department of Robotics and Technical Systems, State University of Information and Communication Technologies, Kyiv, Ukraine.
Anton Zahynei, State University of Information and Communication Technologies, Department of Information and Cybersecurity Systems
Postgraduate student, senior lecturer. Department of Information and Cybersecurity Systems of the State University of Information and Communication Technologies, Kyiv, Ukraine.
Vadym Akhramovych, National Academy of Statistics, Accounting and Auditing, Computing Center
Head of the computing center of the National Academy of Statistics, Accounting and Auditing, Kyiv, Ukraine.
Taras Dzyuba, State University of Information and Communication Technologies, Department of Information and Cybersecurity Management
Ph.D. in Technical Science, Associate Professor of the Department of Information and Cybersecurity Management, State University of Information and Communication Technologies, Kyiv, Ukraine.
Ihor Danylov, State University of Information and Communication Technologies, Department of Information and Cybersecurity Systems
Postgraduate student оf Department of Information and Cybersecurity Systems of the State University of Information and Communication Technologies, Kyiv, Ukraine.

