Journals
Books
Articles by keyword Cybersecurity
Heterogeneous architecture of mass calculations and new threats of cybersecurity
A.Е. Baranovich, S.A. Zheltov
Approach to fuzzing testing of network interfaces of Linux family operating systems using hardware virtualization technology

N.N. Samarin, N.D. Krotov

Features of systems implementing data intensive domains as objects for ensuring information security using the example of automated control systems for agrotechnological processes

V.I. Budzko1, V.G. Belenkov2, V.I. Medennikov3, V.I. Korolev4, P.A. Keyer5

1–5 FRC CSC RAS (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru, 3 dommed@mail.ru, 4 vkorolev@ipiran.ru, 5 pkeyer@ipiran.ru

Management frameworks information technology and cyber risks during the digital transformation of the organization

M.A. Pavlov1

1 Bauman Moscow State Technical University (Moscow, Russia)
1 mikhail.pavlov.mgimosgp@gmail.com

Cybersecurity of systems implementing data intensive domains. Security of the information infrastructure of the data intensive domains

V.I. Budzko1, V.G. Belenkov2, V.I. Korolev3, P.A. Keyer4

1–4 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
3 Gubkin Russian State University of Oil and Gas (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru,3 vkorolev@ipiran.ru, 4 pkeyer@ipiran.ru

Cybersecurity of systems implementing data intensive domains. Security of the information infrastructure of the data intensive domains

V.I. Budzko1, V.I. Korolev2, V.G. Belenkov3, P.A. Keyer4

1–4 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vkorolev@ipiran.ru, 3 vbelenkov@ipiran.ru, 4 pkeyer@ipiran.ru