Journals
Books
Articles by keyword Кибербезопасность
Approach to fuzzing testing of network interfaces of Linux family operating systems using hardware virtualization technology

N.N. Samarin, N.D. Krotov

Cybersecurity of systems implementing data intensive domains. Part 1. The place of cybersecurity in the protection of information

V.I. Budzko1, V.I. Korolev2, V.G. Belenkov3, P.A. Keyer4

1–4 FRC CSC RAS (Moscow, Russia)
1 National Research Nuclear University MEPhI (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vkorolev@ ipiran.ru, 3 vbelenkov@ipiran.ru, 4 pkeyer@ipiran.ru

Features of systems implementing data intensive domains as objects for ensuring information security using the example of automated control systems for agrotechnological processes

V.I. Budzko1, V.G. Belenkov2, V.I. Medennikov3, V.I. Korolev4, P.A. Keyer5

1–5 FRC CSC RAS (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru, 3 dommed@mail.ru, 4 vkorolev@ipiran.ru, 5 pkeyer@ipiran.ru

Management frameworks information technology and cyber risks during the digital transformation of the organization

M.A. Pavlov1

1 Bauman Moscow State Technical University (Moscow, Russia)
1 mikhail.pavlov.mgimosgp@gmail.com

Cybersecurity of systems implementing data intensive domains. Security of the information infrastructure of the data intensive domains

V.I. Budzko1, V.G. Belenkov2, V.I. Korolev3, P.A. Keyer4

1–4 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
3 Gubkin Russian State University of Oil and Gas (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru,3 vkorolev@ipiran.ru, 4 pkeyer@ipiran.ru

Cybersecurity of systems implementing data intensive domains. Security of the information infrastructure of the data intensive domains

V.I. Budzko1, V.I. Korolev2, V.G. Belenkov3, P.A. Keyer4

1–4 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vkorolev@ipiran.ru, 3 vbelenkov@ipiran.ru, 4 pkeyer@ipiran.ru

The ensuring cybersecurity of data intensive domains systems using artificial intelligence technologies

V.I. Budzko1, V.G. Belenkov2

1,2 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru

Cybersecurity of systems implementing data intensive domains. Approaches to the application of artificial intelligence methods to automate the processes of vulnerability detection, detection and prevention of attacks, response to attacks and recovery after attacks

V.I. Budzko1, V.G. Belenkov2, P.A. Keyer3

1–3 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru, 3 pkeyer@ipiran.ru

Cybersecurity of systems implementing data intensive domains. New methods and system solutions for building a secure data processing and analysis environment using the example of an environment that takes into account the specifics of information processing in the healthcare industry

V.I. Budzko1, V.G. Belenkov2

1, 2 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
1 vbudzko@frccsc.ru, 2 vbelenkov@frccsc.ru