MainCatalogInformatics, Computer Engineering and ControlMethods and Systems of Information Protection, Information Security
Algorithms for Solving a Discrete-Continuous Game Based on Combination of the Approximate and Exact Methods in the Context of Information Protection Tasks
Authors: Bykov A.Yu., Sysoev V.V. | Published: 19.06.2024 |
Published in issue: #2(147)/2024 | |
DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information protection tools, zero-sum game, saddle point, discrete programming, linear programming, dual problem |
Model for Presenting the Input Set of Signatures in the Form of a Reduced Decision Diagram
Authors: Dobkach L.Ya., Tsirlov V.L. | Published: 02.04.2024 |
Published in issue: #1(146)/2024 | |
DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: signature analysis, machine learning, CICIDS 2017, intrusion detection, decision trees |
Analysis of Features and Methods for Data Delivery Routes Determination in the Wireless Self-Organizing Networks Based on the Unmanned Aerial Vehicles
Authors: Kulagin G.I. | Published: 12.04.2023 |
Published in issue: #1(142)/2023 | |
DOI: 10.18698/0236-3933-2023-1-60-82 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: wireless Ad Hoc Networks, unmanned aerial vehicles, routing, routing protocols, FANEТ |
Organizing the Protection of Confidential Information Contained in Datasets when Training Neural Networks on Remote Electronic Computers and Cloud Services
Authors: Tarasenko S.S., Morkovin S.V.  | Published: 27.12.2021 |
Published in issue: #4(137)/2021 | |
DOI: 10.18698/0236-3933-2021-4-109-121 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: neural networks, data protection, cloud computing, encryption, generative adversarial networks |
On one Saddle Point Search Algorithm for Continuous Linear Games as Applied to Information Security Problems
Authors: Bykov A.Yu., Krygin I.A., Grishunin M.V., Markova I.А. | Published: 20.12.2020 |
Published in issue: #4(133)/2020 | |
DOI: 10.18698/0236-3933-2020-4-58-74 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, game theory, zero-sum game, continuous game, saddle point, linear programming |
Generalised Quantum Hash Function and Secure One-Way Data Transmission
Authors: Zuev S.V. | Published: 01.10.2018 |
Published in issue: #5(122)/2018 | |
DOI: 10.18698/0236-3933-2018-5-84-98 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: quantum computing, quantum information, quantum hash function, secure data transmission |
Assessment of the Thresholding Impact on Reliability of Anomaly Detection in Network Traffic using Statistical Approach
Authors: Basarab M.A., Sheluhin O.I., Konovalov I.A. | Published: 01.10.2018 |
Published in issue: #5(122)/2018 | |
DOI: 10.18698/0236-3933-2018-5-56-67 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: reliability of detection, anomaly, wavelet transform, wavelet coefficients, thresholding, statistical criteria |
Jamming Methods to Protect Stationary or Slow-Moving Objects
Authors: Vlasov K.V. | Published: 02.08.2017 |
Published in issue: #4(115)/2017 | |
DOI: 10.18698/0236-3933-2017-4-79-87 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: high-precision weapons, homing head, radioelectronic warfare, estimation of efficiency, deflecting countermeasures |
Secure Access to Information using Smart Card
Authors: Buldakova T.I., Lantsberg A.V., Smolyaninova K.A. | Published: 28.05.2017 |
Published in issue: #3(114)/2017 | |
DOI: 10.18698/0236-3933-2017-3-95-106 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: medical information system, electronic medical records, information security, smart card |
Modeling of Information Security Threats of Onboard Aircraft Computing Facilities
Authors: Glinskaya E.V., Chichvarin N.V. | Published: 06.12.2016 |
Published in issue: #6(111)/2016 | |
DOI: 10.18698/0236-3933-2016-6-85-96 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: avionics, automated systems, security, computer systems, information, modular platform |