Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption N. N. Shenets OriginalPaper 04 March 2020 Pages: 857 - 864
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers I. D. PankovA. S. KonoplevA. Yu. Chernov OriginalPaper 04 March 2020 Pages: 865 - 869
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers V. A. LokhvitskiiA. D. KhomonenkoM. A. Bol’shakov OriginalPaper 04 March 2020 Pages: 870 - 873
Estimating the Probability of a Checksum Error in a Message A. P. BaranovP. A. Baranov OriginalPaper 04 March 2020 Pages: 874 - 878
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems E. B. AleksandrovaA. V. YarmakM. O. Kalinin OriginalPaper 04 March 2020 Pages: 879 - 882
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems Sh. G. MagomedovV. P. Los’ OriginalPaper 04 March 2020 Pages: 883 - 888
Application of an Artificial Neural Network for Detection of Attacks in VANETs E. V. MalyshevD. A. MoskvinD. P. Zegzhda OriginalPaper 04 March 2020 Pages: 889 - 894
Modeling Big Data Management Systems in Information Security M. A. PoltavtsevaM. O. Kalinin OriginalPaper 04 March 2020 Pages: 895 - 902
Big Data Management System Security Threat Model M. A. PoltavtsevaD. P. ZegzhdaM. O. Kalinin OriginalPaper 04 March 2020 Pages: 903 - 913
A Consistent Approach to Building Secure Big Data Processing and Storage Systems M. A. Poltavtseva OriginalPaper 04 March 2020 Pages: 914 - 921
Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures N. A. Grusho OriginalPaper 04 March 2020 Pages: 922 - 931
General Principles of Constructing a Motion Control System for a Remotely Operated Sea Vessel in the Port Area Based on the NMEA-2000 Network Protocol I. A. SikarevA. V. Garanin OriginalPaper 04 March 2020 Pages: 932 - 936
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems E. A. ZaitsevaD. P. ZegzhdaM. A. Poltavtseva OriginalPaper 04 March 2020 Pages: 937 - 947
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things A. D. DakhnovichD. A. MoskvinD. P. Zegzhda OriginalPaper 04 March 2020 Pages: 948 - 953
Benford’s Law in the Detection of DoS Attacks on Industrial Systems E. B. AleksandrovaD. S. LavrovaA. V. Yarmak OriginalPaper 04 March 2020 Pages: 954 - 962
Detection of Security Threats to Modern Websites D. V. IvanovD. A. MoskvinG. S. Kubrin OriginalPaper 04 March 2020 Pages: 963 - 968
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users E. B. AleksandrovaE. N. ShkorkinaM. O. Kalinin OriginalPaper 04 March 2020 Pages: 969 - 971
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series D. P. ZegzhdaM. O. KalininM. V. Levykin OriginalPaper 04 March 2020 Pages: 972 - 979
Spoofing Attack on Eigenfaces-Based Biometric Identification System G. B. MarshalkoL. O. Nikiforova OriginalPaper 04 March 2020 Pages: 980 - 986
Model for Identifying Cyber Threats to Internet Information Resources I. V. LuskatovS. V. Pilkevich OriginalPaper 04 March 2020 Pages: 987 - 994
Face Recognition Based on the Coefficient Tree for Three Scale Wavelet Transformation Wang LyanpenO. G. PetrosyanDu Jianming OriginalPaper 04 March 2020 Pages: 995 - 1005
Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks V. M. Krundyshev OriginalPaper 04 March 2020 Pages: 1006 - 1011
Preparing Datasets for Training in a Neural Network System of Intrusion Detection in Industrial Systems V. M. Krundyshev OriginalPaper 04 March 2020 Pages: 1012 - 1016
Model of Cyberattacks on Digital Production Systems E. Yu. Pavlenko OriginalPaper 04 March 2020 Pages: 1017 - 1019
Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model E. Yu. Pavlenko OriginalPaper 04 March 2020 Pages: 1020 - 1022
Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks D. S. Lavrova OriginalPaper 04 March 2020 Pages: 1023 - 1025
Maintaining Cyber Sustainability in Industrial Systems Based on the Concept of Molecular-Genetic Control Systems D. S. Lavrova OriginalPaper 04 March 2020 Pages: 1026 - 1028
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions E. V. DoynikovaA. V. FedorchenkoI. V. Kotenko OriginalPaper 04 March 2020 Pages: 1029 - 1037
Model and Method for Optimizing Computational Processes in Parallel Computing Systems V. G. AnisimovP. D. ZegzhdaV. V. Kasatkin OriginalPaper 04 March 2020 Pages: 1038 - 1044
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls R. A. OgnevE. V. ZhukovskiiD. P. Zegzhda OriginalPaper 04 March 2020 Pages: 1045 - 1055
Cloud-Based Data Architecture Security N. A. SemenovA. A. Poltavtsev OriginalPaper 04 March 2020 Pages: 1056 - 1064
Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters D. S. LavrovaE. A. PopovaA. A. Shtyrkina OriginalPaper 04 March 2020 Pages: 1065 - 1071