Journals
Books
Articles by keyword data intensive domains
Enlarged functional and information models of the information extraction tool complex with built in privacy elements and integration of extracted data

V.I. Budzko – Dr.Sc.(Eng.), Deputy Director, 

Institute of Informatics Problems of FRC CSC RAS (Moscow);

Member of Russian Cryptography Academy;

Professor, 

National Research Nuclear University «MEPhI» (Moscow)

E-mail: vbudzko@ipiran.ru

V.I. Korolev – Dr.Sc.(Eng.), Leading Research Scientist, 

Institute of Informatics Problems of FRC CSC RAS (Moscow); 

Professor, 

Financial University under the Government of the Russian Federation

E-mail: vkorolev@ipiran.ru

V.G. Belenkov – Ph.D.(Eng.), Leading Research Scientist, 

Institute of Informatics Problems of FRC CSC RAS (Moscow) E-mail: vbelenkov@ipiran.ru

Features of use privacy tokens in systems that implement intensive use of data

V.I. Budzko – Dr.Sc.(Eng.), Deputy Director, 

Institute of Informatics Problems of FRC CSC RAS (Moscow);

Member of Russian Cryptography Academy

E-mail: vbudzko@ipiran.ru

V.I. Korolev – Dr.Sc.(Eng.), Leading Research Scientist, 

Institute of Informatics Problems of FRC CSC RAS (Moscow); 

Professor, Financial University under the Government of the Russian Federation

E-mail: vkorolev@ipiran.ru

V.G. Belenkov – Ph.D.(Eng.), Leading Research Scientist, 

Institute of Informatics Problems of FRC CSC RAS (Moscow) E-mail: vbelenkov@ipiran.ru

Privacy elements and prospects of their use in data intensive systems

V.I. Budzko – Dr.Sc.(Eng.), Member of Russian Cryptography Academy, Deputy Director on Research and Development, Institute of Informatics Problems of FRC CSC RAS (Moscow); 

Professor, National Research Nuclear University «MEPhI» (Moscow)

E-mail: vbudzko@ipiran.ru

V.I. Korolev – Dr.Sc.(Eng.), Leading Research Scientist, Institute of Informatics Problems of FRC CSC RAS (Moscow); Professor, Financial University under the Government of the Russian Federation

E-mail: Vkorolev@ipiran.ru

V.G. Belenkov – Ph.D.(Eng.), Leading Research Scientist, Institute of Informatics Problems of FRC CSC RAS (Moscow) E-mail: vbelenkov@ipiran.ru

Features of use privacy tokens in systems that implement intensive use of data

V.I. Budzko1, V.I. Korolev2, V.G. Belenkov3

1-3 Institute of Informatics Problems of FRC CSC RAS (Moscow, Russia)

2 Financial University under the Government of the Russian Federation (Moscow, Russia)

Cybersecurity of systems implementing data intensive domains. Security of the information infrastructure of the data intensive domains

V.I. Budzko1, V.G. Belenkov2, V.I. Korolev3, P.A. Keyer4

1–4 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
3 Gubkin Russian State University of Oil and Gas (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru,3 vkorolev@ipiran.ru, 4 pkeyer@ipiran.ru

Cybersecurity of systems implementing data intensive domains. Security of the information infrastructure of the data intensive domains

V.I. Budzko1, V.I. Korolev2, V.G. Belenkov3, P.A. Keyer4

1–4 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vkorolev@ipiran.ru, 3 vbelenkov@ipiran.ru, 4 pkeyer@ipiran.ru

The ensuring cybersecurity of data intensive domains systems using artificial intelligence technologies

V.I. Budzko1, V.G. Belenkov2

1,2 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru

Cybersecurity of systems implementing data intensive domains. Approaches to the application of artificial intelligence methods to automate the processes of vulnerability detection, detection and prevention of attacks, response to attacks and recovery after attacks

V.I. Budzko1, V.G. Belenkov2, P.A. Keyer3

1–3 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru, 3 pkeyer@ipiran.ru

Cybersecurity of systems implementing data intensive domains. New methods and system solutions for building a secure data processing and analysis environment using the example of an environment that takes into account the specifics of information processing in the healthcare industry

V.I. Budzko1, V.G. Belenkov2

1, 2 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
1 vbudzko@frccsc.ru, 2 vbelenkov@frccsc.ru