Information Security Incident Forecasting T. N. SaurenkoV. G. AnisimovV. P. Los’ OriginalPaper 01 March 2022 Pages: 903 - 907
Application of Neuro-Fuzzy Inference to Detect Network Scanning M. O. Kalinin OriginalPaper 01 March 2022 Pages: 908 - 917
Comparison of Four Methods of Checking the Integrity of Transmitted Message Blocks P. A. Baranov OriginalPaper 01 March 2022 Pages: 918 - 923
Architecture and Operation Algorithm of a Biometric Voice Authentication System E. P. BelovaI. V. Mashkina OriginalPaper 01 March 2022 Pages: 924 - 931
Automated Search for Vulnerabilities in ARM Software Using Dynamic Symbolic Execution T. D. OvasapyanP. V. KnyazevD. A. Moskvin OriginalPaper 01 March 2022 Pages: 932 - 940
Using Artificial Neural Networks to Estimate the Probability of Information Security Threat Occurrences R. A. AntonovE. V. KarachanskayaG. V. Khandozhko OriginalPaper 01 March 2022 Pages: 941 - 948
Constructing the Model of an Information System for the Automatization of Penetration Testing A. V. MyasnikovA. S. KonoplevV. P. Los’ OriginalPaper 01 March 2022 Pages: 949 - 955
Requirements on Providing a Sustainability of Industrial Internet of Things A. D. DakhnovichD. A. MoskvinD. P. Zegzhda OriginalPaper 01 March 2022 Pages: 956 - 961
The Use of Beacon Signals to Detect Covert Channels in DNS Traffic M. A. EremeevV. S. NefedovD. A. Semchenkov OriginalPaper 01 March 2022 Pages: 962 - 969
Methodology of Mediametric Information Analysis with the Use of Machine Learning Algorithms I. E. GorbachevA. A. KriulinI. T. Latypov OriginalPaper 01 March 2022 Pages: 970 - 977
Localization of the Root Cause of the Anomaly A. A. GrushoN. A. GrushoE. E. Timonina OriginalPaper 01 March 2022 Pages: 978 - 983
Comparative Analysis of Methods for Protection against Logical Inference A. A. PoltavtsevA. R. KhabarovA. O. Selyankin OriginalPaper 01 March 2022 Pages: 984 - 990
Application of Synthetic Data Generation Methods to the Detection of Network Attacks on Internet of Things Devices T. D. OvasapyanV. D. DanilovD. A. Moskvin OriginalPaper 01 March 2022 Pages: 991 - 998
Organization of Environmental Monitoring of the Port Water Area by Processing an Anti-Interference Signal from a Vessel Traffic Control System V. A. MiklushI. A. SikarevT. M. Tatarnikova OriginalPaper 01 March 2022 Pages: 999 - 1004
A Method for Watermark Detection in Digital Audio Signals by Authorized Users M. V. GofmanA. A. KornienkoM. L. Glukharev OriginalPaper 01 March 2022 Pages: 1005 - 1019
Operational Efficiency of Computer Networks under Conditions of Malicious Cyber Activity P. D. ZegzhdaV. G. AnisimovV. P. Los’ OriginalPaper 01 March 2022 Pages: 1020 - 1024
Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms I. I. MarshevE. V. ZhukovskiiE. B. Aleksandrova OriginalPaper 01 March 2022 Pages: 1025 - 1028
New Regular Sliding Window Algorithms for Elliptic Curve Scalar Point Multiplication N. N. ShenetsA. S. Petushkov OriginalPaper 01 March 2022 Pages: 1029 - 1038
Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm M. D. StepanovE. Yu. PavlenkoD. S. Lavrova OriginalPaper 01 March 2022 Pages: 1039 - 1050
Detecting Anomalies in Cyber-Physical Systems Using Graph Neural Networks K. V. Vasil’evaD. S. Lavrova OriginalPaper 01 March 2022 Pages: 1051 - 1060
Using Security-through-Obscurity Principle in an Industrial Internet of Things A. D. DakhnovichD. A. MoskvinD. P. Zegzhda OriginalPaper 01 March 2022 Pages: 1061 - 1067
Algorithm for Online Detection of Traffic Anomalies in High-Speed Enterprise Multiservice Communication Networks S. A. AgeevN. S. AgeevaI. A. Sikarev OriginalPaper 01 March 2022 Pages: 1068 - 1079
Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier D. A. KulikovV. V. Platonov OriginalPaper 01 March 2022 Pages: 1080 - 1086
Authentication of Control Devices in the Internet of Things with the Architecture of Edge Computing E. B. AleksandrovaA. Yu. ObloginaE. N. Shkorkina OriginalPaper 01 March 2022 Pages: 1087 - 1091
Detection of Malicious Executable Files Based on Clustering of Activities R. A. OgnevE. V. ZhukovskiiD. P. Zegzhda OriginalPaper 01 March 2022 Pages: 1092 - 1098
Approach to Recognition of Malicious Behavior Based on Autoregression Model upon Investigation into Cyberincident S. I. SmirnovM. A. EremeevI. A. Pribylov OriginalPaper 01 March 2022 Pages: 1099 - 1103
Applying Honeypot Technology with Adaptive Behavior to Internet-of-Things Networks T. D. OvasapyanV. A. NikulkinD. A. Moskvin OriginalPaper 01 March 2022 Pages: 1104 - 1110
Using the Neat-Hypercube Mechanism to Detect Cyber Attacks on IoT Systems A. D. FatinE. Yu. Pavlenko OriginalPaper 01 March 2022 Pages: 1111 - 1114
Use of Contradictions in Data for Finding Implicit Failures in Computer Systems A. A. GrushoN. A. GrushoE. E. Timonina OriginalPaper 01 March 2022 Pages: 1115 - 1120
An Encrypted File Detection Algorithm A. V. KozachokV. I. KozachokA. A. Spirin OriginalPaper 01 March 2022 Pages: 1121 - 1128
Discrete Chaotic Transformations of Hidden Messages to Disguise Them as Noise in Steganography Problems V. N. KustovA. G. Krasnov OriginalPaper 01 March 2022 Pages: 1129 - 1135
Application of Ensembles of Neural Networks Trained on Unbalanced Samples for Analyzing Statuses of IoT Devices M. E. SukhoparovI. S. Lebedev OriginalPaper 01 March 2022 Pages: 1136 - 1141
Improvement of Information Security of Monitoring Channels in Meteor-Burst Communication Networks of the Russian Arctic V. I. DoroshenkoA. N. PivovarovYu. G. Ksenofontov OriginalPaper 01 March 2022 Pages: 1142 - 1148
Theoretical Approach for Evaluating the Connectivity of Distributed Systems and Telecommunications for the Digital Economy E. N. ChizhikovA. A. GorbunovD. V. Stavitskii OriginalPaper 01 March 2022 Pages: 1149 - 1152
A Two-Component Steganographic System Based on the Sum of Linear Functions of Two Signals Using a Multiplicative Form of Constraint of Embedded Signals M. V. Shakurskiy OriginalPaper 01 March 2022 Pages: 1153 - 1158
Basic Principles of Creating Control Algorithms for a Remotely Piloted Sea Vessel to Improve the Information Security of Noisy Data Transmission Channels I. A. SikarevA. V. Garanin OriginalPaper 01 March 2022 Pages: 1159 - 1164
Analysis of a Huge Amount of Network Traffic Based on Quantum Machine Learning M. O. KalininV. M. Krundyshev OriginalPaper 01 March 2022 Pages: 1165 - 1174
Software Identification by Standard Machine Learning Tools M. E. SukhoparovK. I. SalakhutdinovaI. S. Lebedev OriginalPaper 01 March 2022 Pages: 1175 - 1179
On Cryptographic Properties of the NB-Fi Protocol E. K. AlekseevL. R. AkhmetzyanovaA. I. Bondarenko OriginalPaper 01 March 2022 Pages: 1180 - 1187
An Integrity Control Model for Multidimensional Data Arrays S. A. Dichenko OriginalPaper 01 March 2022 Pages: 1188 - 1193
Implementation of Honeypot Systems Based on the Potential Attack Graph E. V. ZavadskiiD. V. Ivanov OriginalPaper 01 March 2022 Pages: 1194 - 1200
Formation of Data Structures in the Problems of Active Security Monitoring M. A. Poltavtseva OriginalPaper 01 March 2022 Pages: 1201 - 1208
Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis V. S. NefedovA. A. KriulinM. A. Eremeev OriginalPaper 01 March 2022 Pages: 1209 - 1214
Fake Post Detection Using Graph Neural Networks O. A. IzotovaD. S. Lavrova OriginalPaper 01 March 2022 Pages: 1215 - 1221
Conceptual Model for Adaptive Control of a Geographic Information System under Conditions of Destabilization V. V. Gryzunov OriginalPaper 01 March 2022 Pages: 1222 - 1227