Journals
Books
Articles by keyword атака
Testing features of the means of biometric neural network authentication of users in the telecommunication system of the Ministry of Education and Science of the Russian Federation
V.I. Volchikhin, I.I. Artemov, V.S. Bezyaev, A.Yu. Malygin
The estimation of quality of information security the information-telecommunication systems, which are exposed to virus attacks
S.A. Nikulin, R.A. Khvorov
Countermeasures against attacks on TLS protocol
S.E. Leontiev, V.O. Popov, S.V. Smyshlyaev
User-s vulnerabilities profile modeling for socio-engineering attacks protection evaluation
A.A. Azarov - Post-graduate Student, SPIIRAS, Saint Petersburg State University
Actual security threats information and control systems of critical objects
А. S. Shaburov - Ph.D. (Eng.), Associate Professor, Perm National Research Polytechnic University. E-mail: shans@at.pstu.ru
R. B. Rashevskiy - Student, Perm National Research Polytechnic University. E-mail: roman@rashevskiy.com
Practical application of neural networks to protect information management systems critical facilities from DDOS-attacks
R.B. Rashevskiy - Student, Department of Automation and Telemechanics, Perm National Research Polytechnic University. E-mail: roman@rashevskiy.com A.S. Shaburov - Ph.D. (Eng.), Associate Professor, Department of Automation and Telemechanics, Perm National Research Polytechnic University. E-mail: shans@ at.pstu.ru
Development of model for detection of computer attacks based on the neural network
A.S. Shaburov - Ph.D. (Eng.), Associate Professor, Department of Automation and Telemechanics, Perm National Research Polytechnic University. E-mail: shans@at.pstu.ru
About rarefied class in the problem of laying backpack backpack and some of its applications in secret communication
A.V. Aleksandrov - Ph. D. (Phys.-Math.), Associate Professor, Department «Informatics and Information Security», Vladimir State University named after A.&N. Stoletovs E-mail: alex_izi@mail.ru
Method of multistatic homomorphism of numbers with feedback on output for an example of equipment IA

A.V. Babash – Dr.Sc.(Phys.-Math.), Professor, HSE (Moscow)

E-mail: avbabash@hse.ru

The formalized representation of the model of threats of information security of APCS

D.V. Chernov – Assistant, 

Department «Information Security», Tula State University; 

Head of Sector of Information Security, JSC ADC (Tula)

E-mail: cherncib@gmail.com

A.A. Sychugov – Ph.D.(Eng.), Associate Professor, 

Head of Department «Information Security», Tula State University; 

Director of Institute of Applied Mathematics and Computer Science of Tula State University E-mail: xru2003@list.ru

Methods of identification and evaluation of vulnerable links of automated process control systems

D.V. Chernov – Assistant, 

Department «Information Security», Tula State University; Head of the Information Security Sector, JSC ADC (Tula) E-mail: cherncib@gmail.com

A.A. Sychugov – Ph.D.(Eng.), Associate Professor, 

Head of Department «Information Security», Tula State University E-mail: xru2003@list.ru

Anticlassification algorithm for targeted computer attack detection in web-oriented honeypot

A.S. Vishnevsky – Post-graduate Student, Information Security Department, Faculty of Informatics and Control Systems, Bauman Moscow State Technical University

E-mail: andrey.s.vishnevsky@gmail.com

P.G. Klyucharev – Ph.D. (Tech.), Associate Professor, Information Security Department, Faculty of Informatics and Control Systems, Bauman Moscow State Technical University

E-mail: pk.iu8@yandex.ru

Models of neural networks for solving the security ensuring problems of the objects of critical information infrastructure

A. S. Shaburov – Ph.D. (Eng.), Associate Professor, Department of Automatics and Telemechanics, Perm National Research Polytechnic University

E-mail: shans@at.pstu.ru

Models of neural networks for solving the security ensuring problems of the objects of critical information infrastructure

A.S. Shaburov1

1 Perm National Research Polytechnic University (Perm, Russia)

Probabilistic security models Blockchain technologies with a small number of participants

V.M. Fomichev1, I.V. Semibratov2

1 Financial University under the Government of Russian Federation, Leading Research Scientist,
Federal Research Center "Computer Science and Control", RAS
2 Financial University under the Government of Russian Federation
 

About the features of managing the security of automated systems that include neural network technologies

V.I. Budzko1, D.A. Melikov2, V.G. Belenkov3

1–3 FRC CSC RAS (Moscow, Russia)
1 National Research Nuclear University MEPhI (Moscow, Russia)
2 Financial University under the Government of the Russian Federation (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 mda-17@yandex.ru; 3 vbelenkov@ipiran.ru