Hierarchical Scheme for Secret Separation Based on Computable Access Labels S. V. BelimN. F. Bogachenko OriginalPaper 18 February 2021 Pages: 773 - 778
Probability of a Checksum Error in a Message with Possible Distortion A. P. BaranovP. A. Baranov OriginalPaper 18 February 2021 Pages: 779 - 785
Ensuring Cybersecurity of Digital Production Using Modern Neural Network Methods V. M. Krundyshev OriginalPaper 18 February 2021 Pages: 786 - 792
Ensuring Cyber Resilience of Large-Scale Network Infrastructure Using the Ant Algorithm E. Yu. PavlenkoK. V. Kudinov OriginalPaper 18 February 2021 Pages: 793 - 802
Isogeny-Based Cryptographic Access Control E. B. AleksandrovaA. A. ShtyrkinaA. V. Yarmak OriginalPaper 18 February 2021 Pages: 803 - 812
Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly Problem E. A. ZaitsevaD. S. Lavrova OriginalPaper 18 February 2021 Pages: 813 - 821
Countering Cyberattacks against Intelligent Bioinspired Systems Based on FANET E. Yu. PavlenkoM. D. Stepanov OriginalPaper 18 February 2021 Pages: 822 - 828
Inference Attacks and Information Security in Databases A. A. PoltavtsevA. R. KhabarovA. O. Selyankin OriginalPaper 18 February 2021 Pages: 829 - 833
Application of Taint Analysis to Study the Safety of Software of the Internet of Things Devices Based on the ARM Architecture T. D. OvasapyanP. V. KnyazevD. A. Moskvin OriginalPaper 18 February 2021 Pages: 834 - 840
A Technique for Safely Transforming the Infrastructure of Industrial Control Systems to the Industrial Internet of Things A. D. DakhnovichD. A. MoskvinD. V. Ivanov OriginalPaper 18 February 2021 Pages: 841 - 849
Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven Distribution of Computational Power A. G. BusyginA. S. Konoplev OriginalPaper 18 February 2021 Pages: 850 - 853
A Procedure for Improving Information System Audit Quality by Enhancing Cyberthreat Simulation in Practice M. A. EremeevI. I. Zakharchuk OriginalPaper 18 February 2021 Pages: 854 - 859
A General Scheme for the Pre-Distribution of Keys S. V. BelimS. Yu. Belim OriginalPaper 18 February 2021 Pages: 860 - 863
Approach to the Evaluation of the Efficiency of Information Security in Control Systems P. D. ZegzhdaV. G. AnisimovV. P. Los’ OriginalPaper 18 February 2021 Pages: 864 - 870
Detection of Network Attacks Using the Tsetlin Machine D. S. LavrovaN. N. Eliseev OriginalPaper 18 February 2021 Pages: 871 - 878
An Approach to Assessing Information Security Effectiveness in Control Systems V. I. KorzhikD. C. NguyenK. A. Akhrameeva OriginalPaper 18 February 2021 Pages: 879 - 887
Lattice-Based Ring Signature with Linking-Based Revocation for Industrial Internet of Things E. B. AleksandrovaI. Sh. RekhviashviliA. V. Yarmak OriginalPaper 18 February 2021 Pages: 888 - 895
On Improving the Reliability and Information Security of Information Transmission Systems in Communication Channels of an Unmanned Vessel I. A. SikarevV. V. SakharovA. V. Garanin OriginalPaper 18 February 2021 Pages: 896 - 899
Identification of Cyber Threats in Networks of Industrial Internet of Things Based on Neural Network Methods Using Memory V. M. Krundyshev OriginalPaper 18 February 2021 Pages: 900 - 906
Reduction of the Number of Analyzed Parameters in Network Attack Detection Systems E. A. PopovaV. V. Platonov OriginalPaper 18 February 2021 Pages: 907 - 914
Analysis of Safety Methods for a New Generation of Automobiles K. V. Vasil’evaE. Yu. PavlenkoP. V. Sem’yanov OriginalPaper 18 February 2021 Pages: 915 - 921
Specification-Based Classification of Network Protocol Vulnerabilities I. V. AlekseevP. D. Zegzhda OriginalPaper 18 February 2021 Pages: 922 - 929
A Model of Optimal Complexification of Measures Providing Information Security P. D. ZegzhdaV. G. AnisimovV. P. Los’ OriginalPaper 18 February 2021 Pages: 930 - 936
Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach D. S. LavrovaR. S. Solovei OriginalPaper 18 February 2021 Pages: 937 - 943
Multilevel Model of Computer Attack Based on Attributive Metagraphs I. T. LatypovM. A. Eremeev OriginalPaper 18 February 2021 Pages: 944 - 948
Securing Post-Quantum Resistance for Quantum-Protected Communication Systems E. N. ShkorkinaE. B. Aleksandrova OriginalPaper 18 February 2021 Pages: 949 - 951
Detection of Distributed Denial of Service Attacks in Large-Scale Networks Based on Methods of Mathematical Statistics and Artificial Intelligence I. V. Alekseev OriginalPaper 18 February 2021 Pages: 952 - 957
Optimal Identification for Objects in Problems on Recognition by Unmanned Underwater Vehicles A. P. NyrkovS. S. SokolovV. A. Dorovskoi OriginalPaper 18 February 2021 Pages: 958 - 963
Algorithms for Enhancing Information Security in the Processing of Navigation Data of Unmanned Vessels of the Technical Fleet of the Inland Waterways of the Russian Federation I. A. SikarevG. B. ChistyakovD. A. Moskvin OriginalPaper 18 February 2021 Pages: 964 - 967
Building an Adaptive System for Collecting and Preparing Data for Security Monitoring M. A. PoltavtsevaD. P. Zegzhda OriginalPaper 18 February 2021 Pages: 968 - 976
The Analysis of Artificial Neural Network Structure Recovery Possibilities Based on the Theory of Graphs D. S. LavrovaA. A. Shtyrkina OriginalPaper 18 February 2021 Pages: 977 - 982
A Survey of Mathematical Methods for Security Analysis of Cyberphysical Systems A. D. FatinE. Yu. PavlenkoM. A. Poltavtseva OriginalPaper 18 February 2021 Pages: 983 - 987
Localizing Failures with Metadata N. A. GrushoA. A. GrushoE. E. Timonina OriginalPaper 18 February 2021 Pages: 988 - 992
Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm M. O. KalininV. M. KrundyshevB. G. Sinyapkin OriginalPaper 18 February 2021 Pages: 993 - 1000
Identification of Anomalies in the Operation of Telecommunication Devices Based on Local Signal Spectra M. E. SukhoparovV. V. SemenovI. S. Lebedev OriginalPaper 18 February 2021 Pages: 1001 - 1006
Access Differentiation in Object-Oriented Databases Based on the Extended Object-Oriented Harrison–Ruzzo–Ullman Model M. L. GlukharevM. F. Solomatova OriginalPaper 18 February 2021 Pages: 1007 - 1012