Journal Automatic Control and Computer Sciences Issue 8/2020 Table of Contents ( 36 Articles ) 01-12-2020 | Issue 8/2020 Hierarchical Scheme for Secret Separation Based on Computable Access Labels S. V. Belim, N. F. Bogachenko 01-12-2020 | Issue 8/2020 Probability of a Checksum Error in a Message with Possible Distortion A. P. Baranov, P. A. Baranov 01-12-2020 | Issue 8/2020 Ensuring Cybersecurity of Digital Production Using Modern Neural Network Methods V. M. Krundyshev 01-12-2020 | Issue 8/2020 Ensuring Cyber Resilience of Large-Scale Network Infrastructure Using the Ant Algorithm E. Yu. Pavlenko, K. V. Kudinov 01-12-2020 | Issue 8/2020 Isogeny-Based Cryptographic Access Control E. B. Aleksandrova, A. A. Shtyrkina, A. V. Yarmak 01-12-2020 | Issue 8/2020 Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly Problem E. A. Zaitseva, D. S. Lavrova 01-12-2020 | Issue 8/2020 Countering Cyberattacks against Intelligent Bioinspired Systems Based on FANET E. Yu. Pavlenko, M. D. Stepanov 01-12-2020 | Issue 8/2020 Inference Attacks and Information Security in Databases A. A. Poltavtsev, A. R. Khabarov, A. O. Selyankin 01-12-2020 | Issue 8/2020 Application of Taint Analysis to Study the Safety of Software of the Internet of Things Devices Based on the ARM Architecture T. D. Ovasapyan, P. V. Knyazev, D. A. Moskvin 01-12-2020 | Issue 8/2020 A Technique for Safely Transforming the Infrastructure of Industrial Control Systems to the Industrial Internet of Things A. D. Dakhnovich, D. A. Moskvin, D. V. Ivanov 01-12-2020 | Issue 8/2020 Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven Distribution of Computational Power A. G. Busygin, A. S. Konoplev 01-12-2020 | Issue 8/2020 A Procedure for Improving Information System Audit Quality by Enhancing Cyberthreat Simulation in Practice M. A. Eremeev, I. I. Zakharchuk 01-12-2020 | Issue 8/2020 A General Scheme for the Pre-Distribution of Keys S. V. Belim, S. Yu. Belim 01-12-2020 | Issue 8/2020 Approach to the Evaluation of the Efficiency of Information Security in Control Systems P. D. Zegzhda, V. G. Anisimov, P. V. Sem’yanov, A. F. Suprun, E. G. Anisimov, T. N. Saurenko, V. P. Los’ 01-12-2020 | Issue 8/2020 Detection of Network Attacks Using the Tsetlin Machine D. S. Lavrova, N. N. Eliseev 01-12-2020 | Issue 8/2020 An Approach to Assessing Information Security Effectiveness in Control Systems V. I. Korzhik, D. C. Nguyen, K. A. Akhrameeva 01-12-2020 | Issue 8/2020 Lattice-Based Ring Signature with Linking-Based Revocation for Industrial Internet of Things E. B. Aleksandrova, I. Sh. Rekhviashvili, A. V. Yarmak 01-12-2020 | Issue 8/2020 On Improving the Reliability and Information Security of Information Transmission Systems in Communication Channels of an Unmanned Vessel I. A. Sikarev, V. V. Sakharov, A. V. Garanin 01-12-2020 | Issue 8/2020 Identification of Cyber Threats in Networks of Industrial Internet of Things Based on Neural Network Methods Using Memory V. M. Krundyshev 01-12-2020 | Issue 8/2020 Reduction of the Number of Analyzed Parameters in Network Attack Detection Systems E. A. Popova, V. V. Platonov 01-12-2020 | Issue 8/2020 Analysis of Safety Methods for a New Generation of Automobiles K. V. Vasil’eva, E. Yu. Pavlenko, P. V. Sem’yanov 01-12-2020 | Issue 8/2020 Specification-Based Classification of Network Protocol Vulnerabilities I. V. Alekseev, P. D. Zegzhda 01-12-2020 | Issue 8/2020 A Model of Optimal Complexification of Measures Providing Information Security P. D. Zegzhda, V. G. Anisimov, A. F. Suprun, E. G. Anisimov, T. N. Saurenko, V. P. Los’ 01-12-2020 | Issue 8/2020 Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach D. S. Lavrova, R. S. Solovei 01-12-2020 | Issue 8/2020 Multilevel Model of Computer Attack Based on Attributive Metagraphs I. T. Latypov, M. A. Eremeev 01-12-2020 | Issue 8/2020 Securing Post-Quantum Resistance for Quantum-Protected Communication Systems E. N. Shkorkina, E. B. Aleksandrova 01-12-2020 | Issue 8/2020 Detection of Distributed Denial of Service Attacks in Large-Scale Networks Based on Methods of Mathematical Statistics and Artificial Intelligence I. V. Alekseev 01-12-2020 | Issue 8/2020 Optimal Identification for Objects in Problems on Recognition by Unmanned Underwater Vehicles A. P. Nyrkov, S. S. Sokolov, O. M. Alimov, S. G. Chernyi, V. A. Dorovskoi 01-12-2020 | Issue 8/2020 Algorithms for Enhancing Information Security in the Processing of Navigation Data of Unmanned Vessels of the Technical Fleet of the Inland Waterways of the Russian Federation I. A. Sikarev, G. B. Chistyakov, A. V. Garanin, D. A. Moskvin 01-12-2020 | Issue 8/2020 Building an Adaptive System for Collecting and Preparing Data for Security Monitoring M. A. Poltavtseva, D. P. Zegzhda 01-12-2020 | Issue 8/2020 The Analysis of Artificial Neural Network Structure Recovery Possibilities Based on the Theory of Graphs D. S. Lavrova, A. A. Shtyrkina 01-12-2020 | Issue 8/2020 A Survey of Mathematical Methods for Security Analysis of Cyberphysical Systems A. D. Fatin, E. Yu. Pavlenko, M. A. Poltavtseva 01-12-2020 | Issue 8/2020 Localizing Failures with Metadata N. A. Grusho, A. A. Grusho, E. E. Timonina 01-12-2020 | Issue 8/2020 Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm M. O. Kalinin, V. M. Krundyshev, B. G. Sinyapkin 01-12-2020 | Issue 8/2020 Identification of Anomalies in the Operation of Telecommunication Devices Based on Local Signal Spectra M. E. Sukhoparov, V. V. Semenov, K. I. Salakhutdinova, I. S. Lebedev 01-12-2020 | Issue 8/2020 Access Differentiation in Object-Oriented Databases Based on the Extended Object-Oriented Harrison–Ruzzo–Ullman Model M. L. Glukharev, M. F. Solomatova