Journals
Books
Articles by keyword Кибербезопасность
Approach to fuzzing testing of network interfaces of Linux family operating systems using hardware virtualization technology

N.N. Samarin, N.D. Krotov

Cybersecurity of systems implementing data intensive domains. Part 1. The place of cybersecurity in the protection of information

V.I. Budzko1, V.I. Korolev2, V.G. Belenkov3, P.A. Keyer4

1–4 FRC CSC RAS (Moscow, Russia)
1 National Research Nuclear University MEPhI (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vkorolev@ ipiran.ru, 3 vbelenkov@ipiran.ru, 4 pkeyer@ipiran.ru

Features of systems implementing data intensive domains as objects for ensuring information security using the example of automated control systems for agrotechnological processes

V.I. Budzko1, V.G. Belenkov2, V.I. Medennikov3, V.I. Korolev4, P.A. Keyer5

1–5 FRC CSC RAS (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru, 3 dommed@mail.ru, 4 vkorolev@ipiran.ru, 5 pkeyer@ipiran.ru

Management frameworks information technology and cyber risks during the digital transformation of the organization

M.A. Pavlov1

1 Bauman Moscow State Technical University (Moscow, Russia)
1 mikhail.pavlov.mgimosgp@gmail.com