Ausgabe 8/2023
Inhalt (35 Artikel)
Assessment of the Effectiveness of an Information Security System
D. P. Zegzhda, T. N. Saurenko, V. G. Anisimov, E. G. Anisimov
Resistance of a Two-Component Steganographic System to Unauthorized Information Extraction
M. V. Shakurskii, O. A. Karaulova, E. S. Kartashevskaya
Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering
A. D. Dakhnovich, D. S. Zagalsky, R. S. Solovey
Current Trends in Methods of the Efficient Automation of Data Processing
I. A. Sikarev, T. V. Vekshina, V. A. Bol’shakov, E. M. Korinets
Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems
D. P. Zegzhda, A. F. Suprun, V. G. Anisimov, A. V. Tebekin, E. G. Anisimov
Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols
S. O. Kostin, E. B. Aleksandrova
Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet
P. V. Semyanov, S. V. Grezina
Decimation of M Sequences As a Way of Obtaining Primitive Polynomials
D. V. Kushnir, S. N. Shemyakin
Risk Assessment of Using Open Source Projects: Analysis of the Existing Approaches
M. A. Eremeev, I. I. Zakharchuk
Analysis of Decompiled Program Code Using Abstract Syntax Trees
N. A. Gribkov, T. D. Ovasapyan, D. A. Moskvin
Features of Detecting Malicious Installation Files Using Machine Learning Algorithms
P. E. Yugai, E. V. Zhukovskii, P. O. Semenov
Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems
M. O. Kalinin, A. F. Suprun, O. D. Ivanova
Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder
V. V. Platonov, N. M. Grigorjeva
Protection of Computational Machine Learning Models against Extraction Threat
M. O. Kalinin, M. D. Soshnev, A. S. Konoplev
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods
S. V. Bezzateev, S. G. Fomicheva, A. F. Suprun
Stability Analysis of the Architecture of Messaging Systems with a Decentralized Node Structure
E. M. Orel, D. A. Moskvin, I. A. Anoshkin
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory
V. M. Krundyshev, G. A. Markov, M. O. Kalinin, P. V. Semyanov, A. G. Busygin
Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks
D. S. Lavrova, O. A. Izotova
Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology
E. Yu. Pavlenko, M. A. Pakhomov
Framework for Modeling Security Policies of Big Data Processing Systems
M. A. Poltavtseva, D. V. Ivanov, E. V. Zavadskii
Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation
M. E. Sukhoparov, I. S. Lebedev
Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks
E. B. Aleksandrova, A. A. Shtyrkina
Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity
D. S. Lavrova, V. M. Bogina, D. P. Zegzhda, E. Yu. Pavlenko