Time filter

Source Type

Kolpaschikov L.,Extreme North Agricultural Research Institute | Makhailo V.,St Petersburg Institute for Informatics and Automation | Russell D.E.,Yukon College
Ecology and Society | Year: 2015

The Taimyr wild reindeer herd, i.e., caribou (Rangifer tarandus), is one of the most important wildlife resources in the Russian Far North and may constitute the largest migratory Rangifer herd in the world. Over the last 60 years the herd has undergone a recovery from low numbers in the 1940s, reaching high densities by 1970 that concerned wildlife managers and domestic husbandry herds, with an 11.7% annual growth rate. At that time an aggressive commercial harvest of the herd was implemented, and organized wolf control was initiated with the goal of stabilizing herd numbers and injecting needed economic activity into the region. These actions dampened the rate of increase throughout the 1970s and 1980s to a 3.0% annual growth rate. From 1991, after the collapse of the Soviet Union and the loss of financial capability to sustain the commercial harvest and continue wolf control, the population again increased at a 5.6% annual growth rate, until peaking in 2000 at just more than 1 million animals. Since 2000 the herd has been in decline; harvesting, primarily unregulated, has increased; the wolf population has increased; and range conditions have deteriorated. Understanding what has occurred in the Taimyr range can provide North American managers with valuable lessons in understanding the large migratory herds on this continent, especially given that the social and political situation in Russia enabled intensive management, i.e., harvest and wolf control, that may not be able to be duplicated in North America. © 2015 by the author(s).


Bukhvalov O.,Intelligent Platform and System Ltd. | Gorodetsky V.,St Petersburg Institute For Informatics And Automation | Karsaev O.,Intelligent Platform and System Ltd. | Kudryavtsev G.,Izhevsky Motozavod Axion Holding | Samoylov V.,Intelligent Platform and System Ltd.
IFAC Proceedings Volumes (IFAC-PapersOnline) | Year: 2013

The paper presents an efficient privacy preserving distributed algorithm intended to coordinate local production schedules of B2B plant network involved in joint fulfillment of multiple dynamically incoming orders. This task is challenging and has no satisfactory solution of industrial scale so far. The proposed solution exploiting multi-agent software architecture is validated based on a case study dealing with industrial scale distributed coordination of production schedules of autonomous shops of a big production plant. © IFAC.


Merkuryeva G.,Riga Technical University | Merkuryev Y.,Riga Technical University | Sokolov B.V.,Saint Petersburg State University of Information Technologies, Mechanics and Optics | Potryasaev S.,St Petersburg Institute For Informatics And Automation | And 2 more authors.
Journal of Computational Science | Year: 2015

The paper presents the state-of-the-art in flood forecasting and simulation applied to a river flood analysis and risk prediction. Different water flow forecasting and river simulation models and systems are analysed. An advanced river flood monitoring, modelling and forecasting approach is introduced. It extends the traditional approach based on modelling river physical processes by integration of different types of models and technologies such as input data clustering and filtering, digital maps of a relief and river terrain, data crowdsourcing, heterogeneous data processing, hydrological models for time scale modelling water flows and geo-simulation, inundation visualisation and duly warning on flooding. A case study on river flow forecasting and simulation for river flood risk analysis and management is given. © 2014 Elsevier B.V.


Gorodetsky V.,St Petersburg Institute For Informatics And Automation | Karsaev O.,St Petersburg Institute For Informatics And Automation | Samoylov V.,St Petersburg Institute For Informatics And Automation | Serebryakov S.,St Petersburg Institute For Informatics And Automation
Communications in Computer and Information Science | Year: 2013

Ever increasing use of heterogeneous networks including mobile devices and ad-hoc sensor networks signifies the role of such information systems' properties as openness, autonomy, cooperation, coordination, etc. Agent-based service-oriented Peer-to-Peer (P2P) architecture provides attractive (if not unique) design and implementation paradigm for such systems. This trend implies coherent evolution of security systems, that put in use the notions of distributed security policy, distributed intrusion detection systems, etc. 1, requiring novel ideas. The paper proposes new architecture for such security systems. This architecture provides cooperative performance of distributed security means (agents) supported by distributed meta-knowledge base implemented as an overlay network of instances of P2P agent platform set up on top of P2P networking provider. The paper also analyzes new issues of P2P security systems with the main emphasis on P2P training of security agents to correlation of alerts produced by other relevant agents. An artificially built case study is used to highlight the essence of P2P security agent training to P2P decision combining and to exhibit new problems. © Springer-Verlag Berlin Heidelberg 2007.


Kotenko I.,St Petersburg Institute For Informatics And Automation | Stepashkin M.,St Petersburg Institute For Informatics And Automation | Doynikova E.,St Petersburg Institute For Informatics And Automation
Proceedings - 19th International Euromicro Conference on Parallel, Distributed, and Network-Based Processing, PDP 2011 | Year: 2011

The paper suggests an attack trees based approach to security analysis of information systems. The approach considers both software-technical and social engineering attacks. It extends the approach to network security analysis based on software-technical attacks which was suggested earlier by the authors of this paper. The main difference is in generalizing the suggested approach for information systems and in use of different conceptions, models and frameworks related to social-engineering attacks. In particular, we define conceptions of legitimate users and control areas. Besides, social-engineering attacks and attacks that require physical access to control areas are included to the attack trees used for security analysis. The paper also describes a security analysis toolkit based on the approach suggested and experiments with it to define the security level of information system. © 2011 IEEE.


Kotenko I.,St Petersburg Institute For Informatics And Automation | Chechulin A.,St Petersburg Institute For Informatics And Automation | Komashinsky D.,F-Secure
Proceedings of the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2015 | Year: 2015

The paper is devoted to the issues of automated categorization of textual information which can be applied in the systems intended to block inappropriate content. The approach used for feature selection and construction is proposed. The text mining methods used for research (Decision Tree classifiers) are analyzed. Besides that, the techniques of Web sites analysis that provide information in different languages are suggested. The aspects of collection and analysis of text features required for classification in certain categories are investigated. Results of experiments on analysis of text correspondence to different categories are given. The classification quality is evaluated. The text classification component, developed as a result of this paper, is intended for realization in F-Secure systems aiming to block inappropriate web content. © 2015 IEEE.


Bogdanov V.,St Petersburg Institute For Informatics And Automation | Kotenko I.,St Petersburg Institute For Informatics And Automation
Communications in Computer and Information Science | Year: 2013

One of topical tasks of policy-based security management is checking that the security policy stated in organization corresponds to its implementation in the computer network. The paper considers the suggested approach to proactive monitoring of security policy performance and security mechanisms functioning. This approach is based on the different strategies of automatic imitation of possible users' actions in the computer network, including exhaustive search, express-analysis and generating the optimized test sequences. It is applicable to different security policies (authentication, authorization, filtering, communication channel protection, etc.). The paper describes stages, generalized algorithms and main peculiarities of the suggested approach and formal methods used to fulfill the test sequence optimization. We consider the generalized architecture of the proactive monitoring system "Proactive security scanner" (PSC) developed, its implementation and an example of policy testing. © Springer-Verlag Berlin Heidelberg 2007.


Kotenko I.,St Petersburg Institute For Informatics And Automation | Konovalov A.,St Petersburg Institute For Informatics And Automation | Shorov A.,St Petersburg Institute For Informatics And Automation
Concurrency Computation Practice and Experience | Year: 2012

The paper outlines a framework and software tool intended for simulation of cooperative defence mechanisms against botnets. These framework and software tool are based on agent-oriented approach and packet-level network simulation. They are intended to evaluate and compare different cooperative distributed attacks and defence mechanisms. Botnet and defence components are represented in the paper as a set of collaborating and counteracting agent teams. Agents are supposed to collect information from various network sources, operate different situational knowledge, and react to actions of other agents. The paper describes the results of experiments aimed to investigate botnets and distributed denial of service defence mechanisms. We explore various botnet attacks and counteraction against them on the example of defence against distributed denial of service attacks. © 2011 John Wiley & Sons, Ltd.


Gorodetsky V.,St Petersburg Institute For Informatics And Automation | Karsaev O.,St Petersburg Institute For Informatics And Automation | Samoylov V.,St Petersburg Institute For Informatics And Automation | Serebryakov S.,St Petersburg Institute For Informatics And Automation
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2010

Peer-to-Peer (P2P) computing, a novel paradigm for distributed information technology, is currently receiving ever increasing interest from both academia and industry. Recent efforts undertaken to integrate multi-agent and P2P architectures are one of such very promising new opportunities. Indeed, multi-agent system (MAS) may be thought of as a multitude of autonomous entities, and, therefore, structuring the agents as a P2P network of nodes may result in an architecture providing a new dimension for design of open MAS composed of a highly transient population of agents. This paper presents an implementation of a P2P Agent Platform providing transparent interaction for distributed P2P agents. The developed P2P Agent Platform implements the basic mandatory components assumed by the functional architecture proposed by the FIPA Nomadic Agents Working Group. This implementation is supported with a search mechanism, a function of an underlying P2P infrastructure. The platform verification is done via prototyping a P2P ground object detection MAS in which the agents situated on top of the distributed instances of the P2P Agent platform provide classification services. © 2010 Springer-Verlag Berlin Heidelberg.


Tishkov A.,St Petersburg Institute For Informatics And Automation | Sidelnikova E.,St Petersburg Institute For Informatics And Automation | Kotenko I.,St Petersburg Institute For Informatics And Automation
Communications in Computer and Information Science | Year: 2013

The paper considers the approach to filtering policy verification. We model potential network traffic with Event Calculus and use abductive proof procedure to detect firewall filtering anomalies in dynamical way. Generally, our approach allows separating network behavior description from security inconsistency definition and thus building flexible and scalable framework for filtering policy verification. © Springer-Verlag Berlin Heidelberg 2007.

Loading St Petersburg Institute For Informatics And Automation collaborators
Loading St Petersburg Institute For Informatics And Automation collaborators