Ausgabe 8/2022
Inhalt (26 Artikel)
Methods of Multidimensional Aggregation of Time Series of Streaming Data for Cyber-Physical System Monitoring
M. A. Poltavtseva, T. M. Andreeva
Botnet Attack Detection Approach in IoT Networks
T. M. Tatarnikova, I. A. Sikarev, P. Yu. Bogdanov, T. V. Timochkina
Trust Evaluation Problems in Big Data Analytics
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina
Detecting Malicious Executable Files Based on Static–Dynamic Analysis Using Machine Learning
R. A. Ognev, E. V. Zhukovskii, D. P. Zegzhda, A. N. Kiselev
Applying Distributed Ledger Technology to Auditing and Incident Investigation in Big Data Processing Systems
M. A. Poltavtseva, V. A. Torgov
Performance Evaluation of Antivirus Systems for Computer Networks
V. G. Anisimov, E. G. Anisimov, T. N. Saurenko, V. P. Los’
Generation of Synthetic Data for Honeypot Systems Using Deep Learning Methods
V. D. Danilov, T. D. Ovasapyan, D. V. Ivanov, A. S. Konoplev, D. A. Moskvin
Mathematical Model of the Spread of Computer Attacks on Critical Information Infrastructure
V. M. Krundyshev, M. O. Kalinin
Adversarial Machine Learning Protection Using the Example of Evasion Attacks on Medical Images
E. A. Rudnitskaya, M. A. Poltavtseva
Immunization of Complex Networks: System of Differential Equations and Dynamic Variation
E. Yu. Pavlenko, A. D. Fatin
Computer Network Clustering Methods in Cybersecurity Problems
E. Yu. Pavlenko, I. S. Eremenko, A. D. Fatin
Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks
E. V. Zavadskii, D. V. Ivanov
Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture
V. N. Ruchkin, B. V. Kostrov, V. A. Fulin
Review and Comparison of Lightweight Modifications of the AES Cipher for a Network of Low-Power Devices
O. I. Berezovskaya, S. S. Chuprov, E. A. Neverov, E. R. Sadreev
Noise-Resistant Coding and Highly Undetectable Stegosystems – Is the Alliance Successful?
V. N. Kustov, A. G. Krasnov
Blockchain Technology in 5G Networks: Performance Comparison of Private and Public Blockchains
I. R. Fedorov, A. V. Pimenov, G. A. Panin, S. V. Bezzateev
Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure
V. M. Krundyshev, M. O. Kalinin