Abstract is missing.
- Verification of internet protocol properties using cooperating automaton objectsDmitriy Levonevskiy, Fedor Novikov, Ludmila N. Fedorchenko, Irina Afanasieva. [doi]
- Multi-path multimodal authentication system for remote information systemEkaterina Pakulova, Artem Ryndin, Oleg Basov. [doi]
- Adaptation of an authentication protocol based on asymmetric keys for use in UAV C2 link security systemsKirill Borisov, Irina Lubushkina, Sergey Panasenko. [doi]
- Modeling of low-rate DDoS-attacksYaroslav Tarasov, Ekaterina Pakulova, Oleg Basov. [doi]
- Forecasting complex multi-component time series within systems designed to detect anomalies in dataflows of industrial automated systemsA. N. Ragozin, V. F. Telezhkin, P. S. Podkorytov. [doi]
- The use of machine learning algorithms for detecting advanced persistent threatsHope Nkiruka Eke, Andrei Petrovski, Hatem Ahriz. [doi]
- Managing influence in complex systems to ensure safety of their operationAlexander Tselykh, Vladislav Vasilev, Larisa Tselykh. [doi]
- Analysis of the initial security of the robotics systemElena Basan, Oleg B. Makarevich, Evgeny Abramov, Dmitry Popov. [doi]
- Cryptographic protocols implementation security verification of the electronic voting system based on blind intermediariesLiudmila Babenko, Ilya Pisarev, Elena Popova. [doi]
- Hybrid neural network framework for detection of cyber attacks at smart infrastructuresVasiliy Krundyshev, Maxim O. Kalinin. [doi]
- Combined authentication schemes with increasing level of resistance and methods for improving the security of electronic signature schemes: kombinirovannye skhemy autentifikacii s povyshennym urovnem stojkosti i metody povysheniya bezopasnosti skhem elektronnoj podpisiAntonina Komarova, Anatoly Korobeynikov. [doi]
- Is it better to choose seen or unseen distracters for graphical passwordsAbdul Ashraf, Ron Poet. [doi]
- Optimization of the cyber security system structure based on accounting of the prevented damage costIgor V. Kotenko, Igor Saenko, Yury Sineshchuk, Valery Kuvatov, Oleg Chudakov. [doi]
- A secure priority vehicle movement based on blockchain technology in connected vehiclesAnil Saini, Shreyansh Sharma, Palash Jain, Vikash Sharma, Arvind Kumar Khandelwal. [doi]
- Liveness detection methods implementation to face identification reinforcement in gaming servicesVyacheslav V. Zolotarev, Alina O. Povazhnyuk, Ekaterina A. Maro. [doi]
- TLS certificate as a sign of establishing a connection with the network TorVitaly Lapshichyov, Oleg B. Makarevich. [doi]
- Investigation of the different implementations for the new cipher QamalKunbolat Algazy, Rustem Biyashev, Nursulu Kapalova, Ludmila K. Babenko, Evgeniya Ishchukova, Saule Nyssanbayeva. [doi]
- Actual and historical state of side channel attacks theoryAndrey V. Krasovsky, Ekaterina A. Maro. [doi]
- IDS-DL: A description language for detection system in cloud computingMohamed Amine Daoud, Youcef Dahmani, Kadda Mostefaoui. [doi]
- Applying of digital signal processing techniques to improve the performance of machine learning-based cyber attack detection in industrial control systemAlexander N. Sokolov, Andrey N. Ragozin, Ilya A. Pyatnitsky, Sergei K. Alabugin. [doi]
- Development of information security quest based on use of information and communication technologiesIshchukova Evgenia, Maro Ekaterina, Veselov Gennady. [doi]
- Safety analysis of the flow of cartographic data with defectsStanislav L. Belyakov, Alexander V. Bozhenyuk, Marina Savelyeva, Marina Belyakova. [doi]
- Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data frameworkIgor V. Kotenko, Nikolay Komashinsky. [doi]
- Steganalysis method of static JPEG images based on artificial immune systemAlexey Nikolaevich Shniperov, Aleksandra Vladimirovna Prokofieva. [doi]
- Development of information security system mathematical models by the solutions of the multigrade Diophantine equation systemsV. O. Osipyan, K. I. Litvinov, R. Kh. Bagdasaryan, E. P. Lukashchik, S. G. Sinitsa, A. S. Zhuk. [doi]
- Method of identifying and assessing of automated process control systems vulnerable elementsDenis Chernov, Alexey Sychugov. [doi]
- Bad-token: denial of service attacks on WPA3Karim Lounis, Mohammad Zulkernine. [doi]
- Evaluation of information reliability of complex systems using intuitionistic fuzzy graphsStanislav L. Belyakov, Alexander V. Bozhenyuk, Olesiya Kosenko, Evgeny Kosenko. [doi]