Ausgabe 8/2015
Inhalt (36 Artikel)
Approach to the construction of the generalized functional-semantic cyber security model
P. D. Zegzhda, D. P. Zegzhda, T. V. Stepanova
Resolving semantic inconsistencies in elibrary.ru based on fuzzy inference
A. D. Khomonenko, S. V. Voitsekhovskii, S. V. Logashev, V. L. Dashonok
Design and verification of protected systems with integrated devices based on expert knowledge
V. A. Desnitskii, I. V. Kotenko
On using the stochastic superindicator for information security evaluation in automated systems
M. A. Eremeev, I. E. Gorbachev
Method of security against computer attacks based on an analysis of executable machine code
V. Yu. Aranov, V. S. Zaborovsky
Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment
N. S. Vert, A. S. Volkova, D. P. Zegzhda, M. O. Kalinin
Applying correlation analysis methods to control flow violation detection in the internet of things
D. Lavrova, A. Pechenkin, V. Gluhov
Model of hidden IT security threats in the cloud computing environment
A. S. Molyakov, V. S. Zaborovsky, A. A. Lukashin
Methods of protecting self-organizing networks against attacks on traffic routing
D. A. Moskvin, D. V. Ivanov
Formal model of cyber attacks on virtualization tools and a measure of hypervisor vulnerability
A. V. Nikolskiy, Yu. S. Vasil’ev
Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster
A. I. Pechenkin, A. V. Nikolskiy
Organization of revocation for lattice-based group signature scheme
E. B. Aleksandrova, E. A. Kuznetsova
Analysis of broadcast schemes that implement identity-based encryption algorithms
A. N. Kulakov, E. B. Aleksandrova
User authentication based on the chess graphical password scheme resistant to shoulder surfing
V. A. Yakovlev, V. V. Arkhipov
Detection of anomalies in behavior of the software with usage of Markov chains
P. D. Zegzhda, S. S. Kort, A. F. Suprun
Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols
A. I. Pechenkin, D. S. Lavrova
The use of virtualization technology in the dynamic analysis of software code
A. Yu. Chernov, A. S. Konoplev