Quarterly journal published in SPbPU
and edited by prof. Dmitry Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
P. A. Glibovsky, P. N. Serebryakov, P. V. Timashov Mozhaisky Military Aerospace Academy
Annotation: The algorithm of ranking sources by potential used to identify malicious information in social networks and the algorithm of ranking countermeasures used to counteract it is considered. They allow you to achieve the required level of protection of users in social networks. Resource consumption, efficiency and objectivity were selected as indicators of the criteria for the effectiveness of the methodology processes. The resource consumption of processes is proposed to evaluate by indicators: "The use of the central processor device", "The use of RAM" and "Operator operation time". When comparing the processes with each other, we take the time of the measurements of the algorithm for ranking sources by potential and sorting the objects of influence.
Keywords: ranking, potential, countermeasure, performance criteria.
Pages 43-52