Skip to main content
main-content
Top

Journal

Automatic Control and Computer Sciences

Automatic Control and Computer Sciences 8/2020

Issue 8/2020

Table of Contents ( 36 Articles )

01-12-2020 | Issue 8/2020

Hierarchical Scheme for Secret Separation Based on Computable Access Labels

S. V. Belim, N. F. Bogachenko

01-12-2020 | Issue 8/2020

Probability of a Checksum Error in a Message with Possible Distortion

A. P. Baranov, P. A. Baranov

01-12-2020 | Issue 8/2020

Ensuring Cybersecurity of Digital Production Using Modern Neural Network Methods

V. M. Krundyshev

01-12-2020 | Issue 8/2020

Ensuring Cyber Resilience of Large-Scale Network Infrastructure Using the Ant Algorithm

E. Yu. Pavlenko, K. V. Kudinov

01-12-2020 | Issue 8/2020

Isogeny-Based Cryptographic Access Control

E. B. Aleksandrova, A. A. Shtyrkina, A. V. Yarmak

01-12-2020 | Issue 8/2020

Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly Problem

E. A. Zaitseva, D. S. Lavrova

01-12-2020 | Issue 8/2020

Countering Cyberattacks against Intelligent Bioinspired Systems Based on FANET

E. Yu. Pavlenko, M. D. Stepanov

01-12-2020 | Issue 8/2020

Inference Attacks and Information Security in Databases

A. A. Poltavtsev, A. R. Khabarov, A. O. Selyankin

01-12-2020 | Issue 8/2020

Application of Taint Analysis to Study the Safety of Software of the Internet of Things Devices Based on the ARM Architecture

T. D. Ovasapyan, P. V. Knyazev, D. A. Moskvin

01-12-2020 | Issue 8/2020

A Technique for Safely Transforming the Infrastructure of Industrial Control Systems to the Industrial Internet of Things

A. D. Dakhnovich, D. A. Moskvin, D. V. Ivanov

01-12-2020 | Issue 8/2020

Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven Distribution of Computational Power

A. G. Busygin, A. S. Konoplev

01-12-2020 | Issue 8/2020

A Procedure for Improving Information System Audit Quality by Enhancing Cyberthreat Simulation in Practice

M. A. Eremeev, I. I. Zakharchuk

01-12-2020 | Issue 8/2020

A General Scheme for the Pre-Distribution of Keys

S. V. Belim, S. Yu. Belim

01-12-2020 | Issue 8/2020

Approach to the Evaluation of the Efficiency of Information Security in Control Systems

P. D. Zegzhda, V. G. Anisimov, P. V. Sem’yanov, A. F. Suprun, E. G. Anisimov, T. N. Saurenko, V. P. Los’

01-12-2020 | Issue 8/2020

Detection of Network Attacks Using the Tsetlin Machine

D. S. Lavrova, N. N. Eliseev

01-12-2020 | Issue 8/2020

An Approach to Assessing Information Security Effectiveness in Control Systems

V. I. Korzhik, D. C. Nguyen, K. A. Akhrameeva

01-12-2020 | Issue 8/2020

Lattice-Based Ring Signature with Linking-Based Revocation for Industrial Internet of Things

E. B. Aleksandrova, I. Sh. Rekhviashvili, A. V. Yarmak

01-12-2020 | Issue 8/2020

On Improving the Reliability and Information Security of Information Transmission Systems in Communication Channels of an Unmanned Vessel

I. A. Sikarev, V. V. Sakharov, A. V. Garanin

01-12-2020 | Issue 8/2020

Identification of Cyber Threats in Networks of Industrial Internet of Things Based on Neural Network Methods Using Memory

V. M. Krundyshev

01-12-2020 | Issue 8/2020

Reduction of the Number of Analyzed Parameters in Network Attack Detection Systems

E. A. Popova, V. V. Platonov

01-12-2020 | Issue 8/2020

Analysis of Safety Methods for a New Generation of Automobiles

K. V. Vasil’eva, E. Yu. Pavlenko, P. V. Sem’yanov

01-12-2020 | Issue 8/2020

Specification-Based Classification of Network Protocol Vulnerabilities

I. V. Alekseev, P. D. Zegzhda

01-12-2020 | Issue 8/2020

A Model of Optimal Complexification of Measures Providing Information Security

P. D. Zegzhda, V. G. Anisimov, A. F. Suprun, E. G. Anisimov, T. N. Saurenko, V. P. Los’

01-12-2020 | Issue 8/2020

Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach

D. S. Lavrova, R. S. Solovei

01-12-2020 | Issue 8/2020

Multilevel Model of Computer Attack Based on Attributive Metagraphs

I. T. Latypov, M. A. Eremeev

01-12-2020 | Issue 8/2020

Securing Post-Quantum Resistance for Quantum-Protected Communication Systems

E. N. Shkorkina, E. B. Aleksandrova

01-12-2020 | Issue 8/2020

Detection of Distributed Denial of Service Attacks in Large-Scale Networks Based on Methods of Mathematical Statistics and Artificial Intelligence

I. V. Alekseev

01-12-2020 | Issue 8/2020

Optimal Identification for Objects in Problems on Recognition by Unmanned Underwater Vehicles

A. P. Nyrkov, S. S. Sokolov, O. M. Alimov, S. G. Chernyi, V. A. Dorovskoi

01-12-2020 | Issue 8/2020

Algorithms for Enhancing Information Security in the Processing of Navigation Data of Unmanned Vessels of the Technical Fleet of the Inland Waterways of the Russian Federation

I. A. Sikarev, G. B. Chistyakov, A. V. Garanin, D. A. Moskvin

01-12-2020 | Issue 8/2020

Building an Adaptive System for Collecting and Preparing Data for Security Monitoring

M. A. Poltavtseva, D. P. Zegzhda

01-12-2020 | Issue 8/2020

The Analysis of Artificial Neural Network Structure Recovery Possibilities Based on the Theory of Graphs

D. S. Lavrova, A. A. Shtyrkina

01-12-2020 | Issue 8/2020

A Survey of Mathematical Methods for Security Analysis of Cyberphysical Systems

A. D. Fatin, E. Yu. Pavlenko, M. A. Poltavtseva

01-12-2020 | Issue 8/2020

Localizing Failures with Metadata

N. A. Grusho, A. A. Grusho, E. E. Timonina

01-12-2020 | Issue 8/2020

Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm

M. O. Kalinin, V. M. Krundyshev, B. G. Sinyapkin

01-12-2020 | Issue 8/2020

Identification of Anomalies in the Operation of Telecommunication Devices Based on Local Signal Spectra

M. E. Sukhoparov, V. V. Semenov, K. I. Salakhutdinova, I. S. Lebedev

01-12-2020 | Issue 8/2020

Access Differentiation in Object-Oriented Databases Based on the Extended Object-Oriented Harrison–Ruzzo–Ullman Model

M. L. Glukharev, M. F. Solomatova

Current Publications