Ausgabe 8/2018
Inhalt (41 Artikel)
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity
P. D. Zegzhda, D. V. Ivanov, D. A. Moskvin, A. A. Ivanov
Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks
M. O. Kalinin, V. M. Krundyshev, E. Yu. Rezedinova, D. V. Reshetov
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series
M. O. Kalinin, D. S. Lavrova, A. V. Yarmak
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
P. D. Zegzhda, M. A. Poltavtseva, A. I. Pechenkin, D. S. Lavrova, E. A. Zaitseva
Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation
D. S. Lavrova, I. V. Alekseev, A. A. Shtyrkina
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks
P. D. Zegzhda, D. S. Lavrova, A. A. Shtyrkina
A Distributed Intrusion Detection System with Protection from an Internal Intruder
S. I. Shterenberg, M. A. Poltavtseva
Using Neural Networks to Detect Internal Intruders in VANETs
T. D. Ovasapyan, D. A. Moskvin, M. O. Kalinin
Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices
V. V. Platonov, P. O. Semenov
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security
R. A. Demidov, A. I. Pechenkin, P. D. Zegzhda, M. O. Kalinin
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model
R. A. Demidov, P. D. Zegzhda, M. O. Kalinin
Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence
M. O. Kalinin, E. A. Zubkov, A. F. Suprun, A. I. Pechenkin
Cyber-sustainability of Software-Defined Networks Based on Situational Management
D. P. Zegzhda, E. Yu. Pavlenko
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks
P. D. Zegzhda, D. V. Ivanov, D. A. Moskvin, G. S. Kubrin
Approaches to Modeling the Security of Cyberphysical Systems
D. P. Zegzhda, Yu. S. Vasil’ev, M. A. Poltavtseva
An Approach to the Programs Security Analysis using Vector Representation of Machine Code
R. A. Demidov, A. I. Pechenkin
A Blockchain Decentralized Public Key Infrastructure Model
A. S. Konoplev, A. G. Busygin, D. P. Zegzhda
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code
R. A. Demidov, A. I. Pechenkin, P. D. Zegzhda
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE
D. P. Zegzhda, E. S. Usov, A. V. Nikol’skii, E. Yu. Pavlenko
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model
T. D. Ovasapyan, D. V. Ivanov
Analysis of the Information Security Threats in the Digital Production Networks
A. D. Dakhnovich, D. A. Moskvin, D. P. Zegzhda
Protection of Valuable Information in Information Technologies
A. A. Grusho, N. A. Grusho, M. I. Zabezhaylo, E. E. Timonina
Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph
A. G. Busygin, A. S. Konoplev, D. P. Zegzhda
Problems of Security in Digital Production and Its Resistance to Cyber Threats
Yu. S. Vasil’ev, D. P. Zegzhda, M. A. Poltavtseva
Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem
K. I. Salakhutdinova, I. S. Lebedev, I. E. Krivtsova, M. E. Sukhoparov
The Problem of Innovative Development of Information Security Systems in the Transport Sector
V. G. Anisimov, E. G. Anisimov, P. D. Zegzhda, A. F. Suprun
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology
D. P. Zegzhda, D. A. Moskvin, A. V. Myasnikov
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
A. D. Dakhnovich, D. P. Zegzhda, D. A. Moskvin
Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels
S. V. Belim, S. Yu. Belim
Use of Statistical Processing of Reference Images in Biometric Authentication Systems
V. P. Los’, G. V. Ross, E. D. Tyshuk
Architecture of the Protected Cloud Data Storage Using Intel SGX Technology
E. S. Usov, A. V. Nikol’skii, E. Yu. Pavlenko, D. P. Zegzhda
Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations
E. B. Aleksandrova, E. N. Shkorkina
Application of Systems Theory Laws for Investigating Information Security Problems
V. N. Volkova, Yu. Yu. Chernyi