The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity P. D. ZegzhdaD. V. IvanovA. A. Ivanov OriginalPaper 07 March 2019 Pages: 901 - 905
Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks M. O. KalininV. M. KrundyshevD. V. Reshetov OriginalPaper 07 March 2019 Pages: 906 - 911
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series M. O. KalininD. S. LavrovaA. V. Yarmak OriginalPaper 07 March 2019 Pages: 912 - 917
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems P. D. ZegzhdaM. A. PoltavtsevaE. A. Zaitseva OriginalPaper 07 March 2019 Pages: 918 - 930
Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation D. S. LavrovaI. V. AlekseevA. A. Shtyrkina OriginalPaper 07 March 2019 Pages: 931 - 935
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks P. D. ZegzhdaD. S. LavrovaA. A. Shtyrkina OriginalPaper 07 March 2019 Pages: 936 - 944
A Distributed Intrusion Detection System with Protection from an Internal Intruder S. I. ShterenbergM. A. Poltavtseva OriginalPaper 07 March 2019 Pages: 945 - 953
Using Neural Networks to Detect Internal Intruders in VANETs T. D. OvasapyanD. A. MoskvinM. O. Kalinin OriginalPaper 07 March 2019 Pages: 954 - 958
Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices V. V. PlatonovP. O. Semenov OriginalPaper 07 March 2019 Pages: 959 - 964
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security R. A. DemidovA. I. PechenkinM. O. Kalinin OriginalPaper 07 March 2019 Pages: 965 - 970
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model R. A. DemidovP. D. ZegzhdaM. O. Kalinin OriginalPaper 07 March 2019 Pages: 971 - 976
Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence M. O. KalininE. A. ZubkovA. I. Pechenkin OriginalPaper 07 March 2019 Pages: 977 - 983
Cyber-sustainability of Software-Defined Networks Based on Situational Management D. P. ZegzhdaE. Yu. Pavlenko OriginalPaper 07 March 2019 Pages: 984 - 992
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks P. D. ZegzhdaD. V. IvanovG. S. Kubrin OriginalPaper 07 March 2019 Pages: 993 - 999
Approaches to Modeling the Security of Cyberphysical Systems D. P. ZegzhdaYu. S. Vasil’evM. A. Poltavtseva OriginalPaper 07 March 2019 Pages: 1000 - 1009
An Approach to the Programs Security Analysis using Vector Representation of Machine Code R. A. DemidovA. I. Pechenkin OriginalPaper 07 March 2019 Pages: 1010 - 1016
A Blockchain Decentralized Public Key Infrastructure Model A. S. KonoplevA. G. BusyginD. P. Zegzhda OriginalPaper 07 March 2019 Pages: 1017 - 1021
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code R. A. DemidovA. I. PechenkinP. D. Zegzhda OriginalPaper 07 March 2019 Pages: 1022 - 1028
Modeling the Dissemination of Information Threats in Social Media I. I. FalconeO. Yu. Gatsenko OriginalPaper 07 March 2019 Pages: 1029 - 1035
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE D. P. ZegzhdaE. S. UsovE. Yu. Pavlenko OriginalPaper 07 March 2019 Pages: 1036 - 1041
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model T. D. OvasapyanD. V. Ivanov OriginalPaper 07 March 2019 Pages: 1042 - 1048
CRC Error Probability under Batch Random Noise A. P. BaranovP. A. Baranov OriginalPaper 07 March 2019 Pages: 1049 - 1058
Directed Digital Signature on Isogenies of Elliptic Curves E. B. AleksandrovaA. A. Shtyrkina OriginalPaper 07 March 2019 Pages: 1059 - 1064
Security of a Key System of a Fiscal Feature V. S. GorbatovI. Yu. ZhukovO. N. Murashov OriginalPaper 07 March 2019 Pages: 1065 - 1070
Analysis of the Information Security Threats in the Digital Production Networks A. D. DakhnovichD. A. MoskvinD. P. Zegzhda OriginalPaper 07 March 2019 Pages: 1071 - 1075
Protection of Valuable Information in Information Technologies A. A. GrushoN. A. GrushoE. E. Timonina OriginalPaper 07 March 2019 Pages: 1076 - 1079
Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph A. G. BusyginA. S. KonoplevD. P. Zegzhda OriginalPaper 07 March 2019 Pages: 1080 - 1083
Noise Immunity of Noncoherent Reception under Complex Interference Effect on Communication and Monitoring Channels of Automated Information Systems of River Transport on Inland Waterways of the Russian Federation A. A. SikarevI. A. SikarevA. V. Garanin OriginalPaper 07 March 2019 Pages: 1084 - 1089
Problems of Security in Digital Production and Its Resistance to Cyber Threats Yu. S. Vasil’evD. P. ZegzhdaM. A. Poltavtseva OriginalPaper 07 March 2019 Pages: 1090 - 1100
Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem K. I. SalakhutdinovaI. S. LebedevM. E. Sukhoparov OriginalPaper 07 March 2019 Pages: 1101 - 1104
The Problem of Innovative Development of Information Security Systems in the Transport Sector V. G. AnisimovE. G. AnisimovA. F. Suprun OriginalPaper 07 March 2019 Pages: 1105 - 1110
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology D. P. ZegzhdaD. A. MoskvinA. V. Myasnikov OriginalPaper 07 March 2019 Pages: 1111 - 1116
Development of a Heuristic Mechanism for Detection of Malware Programs Based on Hidden Markov Models A. V. Kozachok OriginalPaper 07 March 2019 Pages: 1117 - 1123
Implementation of Mandatory Access Control in Distributed Systems S. V. BelimS. Yu. Belim OriginalPaper 07 March 2019 Pages: 1124 - 1126
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network A. D. DakhnovichD. P. ZegzhdaD. A. Moskvin OriginalPaper 07 March 2019 Pages: 1127 - 1133
Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels S. V. BelimS. Yu. Belim OriginalPaper 07 March 2019 Pages: 1134 - 1137
Use of Statistical Processing of Reference Images in Biometric Authentication Systems V. P. Los’G. V. RossE. D. Tyshuk OriginalPaper 07 March 2019 Pages: 1138 - 1143
Architecture of the Protected Cloud Data Storage Using Intel SGX Technology E. S. UsovA. V. Nikol’skiiD. P. Zegzhda OriginalPaper 07 March 2019 Pages: 1144 - 1149
Digital Manufacturing Security Indicators D. P. ZegzhdaE. Yu. Pavlenko OriginalPaper 07 March 2019 Pages: 1150 - 1159
Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations E. B. AleksandrovaE. N. Shkorkina OriginalPaper 07 March 2019 Pages: 1160 - 1163
Application of Systems Theory Laws for Investigating Information Security Problems V. N. VolkovaYu. Yu. Chernyi OriginalPaper 07 March 2019 Pages: 1164 - 1170