MainCatalogInformatics, Computer Engineering and ControlMethods and Systems of Information Protection, Information Security
Organizing the Protection of Confidential Information Contained in Datasets when Training Neural Networks on Remote Electronic Computers and Cloud Services
Authors: Tarasenko S.S., Morkovin S.V.  | Published: 27.12.2021 |
Published in issue: #4(137)/2021 | |
DOI: 10.18698/0236-3933-2021-4-109-121 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: neural networks, data protection, cloud computing, encryption, generative adversarial networks |
On one Saddle Point Search Algorithm for Continuous Linear Games as Applied to Information Security Problems
Authors: Bykov A.Yu., Krygin I.A., Grishunin M.V., Markova I.А. | Published: 20.12.2020 |
Published in issue: #4(133)/2020 | |
DOI: 10.18698/0236-3933-2020-4-58-74 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, game theory, zero-sum game, continuous game, saddle point, linear programming |
Generalised Quantum Hash Function and Secure One-Way Data Transmission
Authors: Zuev S.V. | Published: 01.10.2018 |
Published in issue: #5(122)/2018 | |
DOI: 10.18698/0236-3933-2018-5-84-98 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: quantum computing, quantum information, quantum hash function, secure data transmission |
Assessment of the Thresholding Impact on Reliability of Anomaly Detection in Network Traffic using Statistical Approach
Authors: Basarab M.A., Sheluhin O.I., Konovalov I.A. | Published: 01.10.2018 |
Published in issue: #5(122)/2018 | |
DOI: 10.18698/0236-3933-2018-5-56-67 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: reliability of detection, anomaly, wavelet transform, wavelet coefficients, thresholding, statistical criteria |
Jamming Methods to Protect Stationary or Slow-Moving Objects
Authors: Vlasov K.V. | Published: 02.08.2017 |
Published in issue: #4(115)/2017 | |
DOI: 10.18698/0236-3933-2017-4-79-87 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: high-precision weapons, homing head, radioelectronic warfare, estimation of efficiency, deflecting countermeasures |
Secure Access to Information using Smart Card
Authors: Buldakova T.I., Lantsberg A.V., Smolyaninova K.A. | Published: 28.05.2017 |
Published in issue: #3(114)/2017 | |
DOI: 10.18698/0236-3933-2017-3-95-106 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: medical information system, electronic medical records, information security, smart card |
Modeling of Information Security Threats of Onboard Aircraft Computing Facilities
Authors: Glinskaya E.V., Chichvarin N.V. | Published: 06.12.2016 |
Published in issue: #6(111)/2016 | |
DOI: 10.18698/0236-3933-2016-6-85-96 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: avionics, automated systems, security, computer systems, information, modular platform |
The main directions of expanding the insider information security model
Authors: Sychev V.M. | Published: 08.04.2016 |
Published in issue: #2(107)/2016 | |
DOI: 10.18698/0236-3933-2016-2-125-137 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, insider, intruder model, temporality, classification, data mining |
Heuristic analysis of source code security
Authors: Markov A.S. , Matveev V.A. , Fadin A.A., Tsirlov V.L. | Published: 19.02.2016 |
Published in issue: #1(106)/2016 | |
DOI: 10.18698/0236-3933-2016-1-98-111 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, software security, testing, static analysis, production models, heuristic analysis, vulnerabilities, defects, undeclared capabilities |
Thе prime formation model based on the symmetric representation of ring factorization in selecting composite numbers
Authors: Minaev V.A., Vayts E.V., Nikerov D.V., Nikonov S.A. | Published: 19.02.2016 |
Published in issue: #1(106)/2016 | |
DOI: 10.18698/0236-3933-2016-1-89-97 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, primes, ring factorization |