Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2022

01-12-2022

Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture

Authors: V. N. Ruchkin, B. V. Kostrov, V. A. Fulin

Published in: Automatic Control and Computer Sciences | Issue 8/2022

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and striving for brinkmanship, and ensuring sufficient security with minimal effort for customers and consumers while not impairing—and in some cases improving—the privacy of their infrastructure and the Internet of Things (IoT) security maturity model (SMM). The benefits of the latter strategy are estimated by selecting an architecture with the core of the IoT SMM in the form of a hierarchy of security practices. Algorithms ensuring privacy and protection from threats are analyzed. A methodology for analyzing and selecting the best architecture for multicore hierarchical clustering of computer systems is proposed. An expert system based on the on-chip MCNPAoC SBIS 1879BM8Y instrument module MS 127.05 with the proposed user interface is implemented.
Literature
1.
go back to reference Rudina, E. and Goncharov, U., Maturity model of security of the Internet of Things: A boon for the development of secure systems of AO Laboratoriya Kasperskogo, 2019. Rudina, E. and Goncharov, U., Maturity model of security of the Internet of Things: A boon for the development of secure systems of AO Laboratoriya Kasperskogo, 2019.
2.
go back to reference Jozwiak, L., Introduction to modern cyber-physical systems and their quality-driven design, Proc. 8th Mediterranean Conf. on Embedded Computing, CPS & IoT, MECO’2019, Budva, Montenegro, 2019, pp. 3–65. Jozwiak, L., Introduction to modern cyber-physical systems and their quality-driven design, Proc. 8th Mediterranean Conf. on Embedded Computing, CPS & IoT, MECO’2019, Budva, Montenegro, 2019, pp. 3–65.
3.
go back to reference Horst, F., A survey of problems in authenticated communication and control, MIT Lincoln Laboratory, 1958. Horst, F., A survey of problems in authenticated communication and control, MIT Lincoln Laboratory, 1958.
4.
go back to reference Chernikov, A., Chernikov, V., Vixne, P., and Shelukhin, A., New core of signal processor core NMC4 of set neuro matrix, Proc. 6th Moscow Supercomputing Forum, 2015, pp. 12–13. Chernikov, A., Chernikov, V., Vixne, P., and Shelukhin, A., New core of signal processor core NMC4 of set neuro matrix, Proc. 6th Moscow Supercomputing Forum, 2015, pp. 12–13.
6.
go back to reference Ruchkin, V.N., Kostrov, B.V., and Svirina, A.G., Sistemy iskusstvennogo intellekta. Neiroseti i neirokomp’yutery. Uchebnik (Artificial Intelligence Systems: Neural Networks and Neurocomputers: Textbook), Moscow: Kurs, 2018. Ruchkin, V.N., Kostrov, B.V., and Svirina, A.G., Sistemy iskusstvennogo intellekta. Neiroseti i neirokomp’yutery. Uchebnik (Artificial Intelligence Systems: Neural Networks and Neurocomputers: Textbook), Moscow: Kurs, 2018.
7.
8.
go back to reference Zlobin, V.K. and Ruchkin, V.N., Neiroseti I neirokomp’yutery. Uchebnoe posobie (Neural Networks and Neurocomputers), St. Petersburg: BKhV-Peterburg, 2011. Zlobin, V.K. and Ruchkin, V.N., Neiroseti I neirokomp’yutery. Uchebnoe posobie (Neural Networks and Neurocomputers), St. Petersburg: BKhV-Peterburg, 2011.
Metadata
Title
Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture
Authors
V. N. Ruchkin
B. V. Kostrov
V. A. Fulin
Publication date
01-12-2022
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2022
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S014641162208020X

Other articles of this Issue 8/2022

Automatic Control and Computer Sciences 8/2022 Go to the issue