Journals
Books
Articles by keyword threats
FUZZY PETRI NET FOR MODELING METHOD OF SECURITY THREATS
V. A. Gusachenko, S. A. Zakharchenko
Risk model for a system that identifies hazardous external factors
N.A. Baranov, I.V. Vasiliev
Heterogeneous architecture of mass calculations and new threats of cybersecurity
A.Е. Baranovich, S.A. Zheltov
The methods of information security from internal threats
V.V. Martynenko
The creation of the fuzzy cognitive maps and artificial neural network in cloud computing system for an assessment of information risks
I.V. Mashkina, A.U. Sentsovа, E.S. Stepanova
The semantic description of factors of safety of information systems at design of systems of protection
O.V. Lukinova - Research Scientist, Jnstitute of control V.A. Trapeznikova RAS. E-mail: lobars@mail.ru
Recognizing situations based on cognitive modeling in geographically distributed protection systems
А. В. Barsukov - Ph.D. (Eng.)
S. V. Gusev
D. F. Shukshin
Evaluating the effectiveness of information security systems using fuzzy logic
A. I. Kuralenko - Post-graduate Student, TUSUR. E-mail: Kuralenko@outlook.com
Modeling of spatially distributed objects security threats by means of potentials method
S.S. Zwierzynski - Dr. Sc. (Eng.), Professor I.V. Parfentsev - Ph. D. (Eng.), Assistant Professor V.A. Perednya
Topical issues of identifying vulnerabilities and undeclared capabilities in software

A.V. Barabanov – Ph.D.(Eng.), Deputy General Director of NPO «Echelon» (Moscow)

E-mail: a.barabanov@npo-echelon.ru

A.S. Markov – Dr.Sc.(Eng.), President of NPO «Echelon» (Moscow)

E-mail: a.markov@npo-echelon.ru

V.L. Tsirlov – Ph.D.(Eng.), General Director of NPO «Echelon» (Moscow) E-mail: v.tsirlov@npo-echelon.ru

Approach to the assessment of information system security, based on the analysis of incidents

A.Yu. Ermakova – Senior Lecturer, RTU MIREA (Moscow) E-mail: a.alla1105@mail.ru

Network anomaly detection and classification using a combination of two artificial neural networks

O. I. Shelukhin – Dr.Sc. (Eng.), Professor, Head of Department of Information Security, Moscow Technical University of Communication and Informatics

E-mail: sheluhin@mail.ru

V. O. Musatov – Master’s Degree Student, Department of Information Security, Moscow Technical University of Communication and Informatics

E-mail: vladimirus@protonmail.com

Optimization of the structure of information systems based on stochastic methods

S.A. Skachkov1, A.V. Klyuev2, I.L. Zhbanov3, A.V. Maximov4, G.A. Gabrielyan5, I.A. Isayeva6

1−3 Military Academy of the Armed Forces of the Russian Federation (Smolensk, Россия)

4 JSC Morinsis-Agat Concern (Moscow, Russia)

5−6 Institute of Information Technologies of RTU MIREA (Moscow, Russia)

About the features of managing the security of automated systems that include neural network technologies

V.I. Budzko1, V.G. Belenkov2, V.I. Korolev3, D.A. Melikov4

1–4 FRC CSC RAS (Moscow, Russia)
1 National Research Nuclear University MEPhI (Moscow, Russia)
4 Financial University under the Government of the Russian Federation (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru, 3 vkorolev@ ipiran.ru, 4 mda-17@yandex.ru

About the features of managing the security of automated systems that include neural network technologies

V.I. Budzko1, D.A. Melikov2, V.G. Belenkov3

1–3 FRC CSC RAS (Moscow, Russia)
1 National Research Nuclear University MEPhI (Moscow, Russia)
2 Financial University under the Government of the Russian Federation (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 mda-17@yandex.ru; 3 vbelenkov@ipiran.ru

Cybersecurity of systems implementing data intensive domains. Part 1. The place of cybersecurity in the protection of information

V.I. Budzko1, V.I. Korolev2, V.G. Belenkov3, P.A. Keyer4

1–4 FRC CSC RAS (Moscow, Russia)
1 National Research Nuclear University MEPhI (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vkorolev@ ipiran.ru, 3 vbelenkov@ipiran.ru, 4 pkeyer@ipiran.ru

A technique for increasing the throughput and reducing the reaction time to new threats of aviation electronic warfare systems under specified resource constraints

A.M. Zamarin1

1 JSC “CNIRTI named after academician A.I. Berg” (Moscow, Russia)

1 andrewzam@mail.ru

Theoretical foundations for the development of a methodological apparatus for assessing the dynamics of information security threats

S.V. Skryl1, V.I. Terekhov2, S.S. Nikulin3, I.I. Korchagin4, V.A. Vladychenskaia5

1,2,5 Bauman Moscow State Technical University (National Research University) (Moscow, Russia)
3 Voronezh Institute of the Ministry of Internal Affairs of Russia (Voronezh, Russia)
4 Information Implementation Company (Moscow, Russia)
1skryl@bmstu.ru, 2terekchow@bmstu.ru, 3nikcc@mail.ru, 4korchagin@ivk.ru, 5varvara_zi@mail.ru