Information security architecture synthesis in distributed information computation systems A. A. GrushoN. A. GrushoE. E. Timonina OriginalPaper 01 March 2018 Pages: 799 - 804
Cyber-physical system homeostatic security management D. P. ZegzhdaE. Yu. Pavlenko OriginalPaper 01 March 2018 Pages: 805 - 816
An ontological model of the domain of applications for the Internet of Things in analyzing information security D. S. LavrovaYu. S. Vasil’ev OriginalPaper 01 March 2018 Pages: 817 - 823
Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects V. G. AnisimovE. G. AnisimovS. P. Prisyazhnyuk OriginalPaper 01 March 2018 Pages: 824 - 828
Hierarchical approach to analyzing security breaches in information systems E. Yu. PavlenkoA. V. YarmakD. A. Moskvin OriginalPaper 01 March 2018 Pages: 829 - 834
Systematization and security assessment of cyber-physical systems D. P. ZegzhdaM. A. PoltavtsevaD. S. Lavrova OriginalPaper 01 March 2018 Pages: 835 - 843
The task of building a trusted computing environment on the Intel hardware platform A. Yu. ChernovA. S. KonoplevD. V. Reshetov OriginalPaper 01 March 2018 Pages: 844 - 847
Use of Intel SGX to ensure the confidentiality of data of cloud users D. P. ZegzhdaE. S. UsovE. Yu. Pavlenko OriginalPaper 01 March 2018 Pages: 848 - 854
Applying NFC for automated replication of user data D. V. IvanovD. A. MoskvinA. F. Suprun OriginalPaper 01 March 2018 Pages: 855 - 859
Identifying a potential insider using classification models A. S. ZaytsevA. A. Malyuk OriginalPaper 01 March 2018 Pages: 860 - 866
Application of clustering methods for analyzing the security of Android applications E. Yu. PavlenkoA. V. YarmakD. A. Moskvin OriginalPaper 01 March 2018 Pages: 867 - 873
The use of an artificial neural network to detect automatically managed accounts in social networks P. D. ZegzhdaE. V. MalyshevE. Yu. Pavlenko OriginalPaper 01 March 2018 Pages: 874 - 880
Siamese neural network for intelligent information security control in multi-robot systems L. V. UtkinV. S. ZaborovskyS. G. Popov OriginalPaper 01 March 2018 Pages: 881 - 887
Application of convolutional neural networks for preventing information leakage in open internet resources D. O. ZhukovD. A. AkimovV. P. Los’ OriginalPaper 01 March 2018 Pages: 888 - 893
An adaptive model of a distributed intrusion detection system V. V. PlatonovP. O. Semenov OriginalPaper 01 March 2018 Pages: 894 - 898
Security evaluation of a wireless ad-hoc network with dynamic topology M. O. KalininA. A. Minin OriginalPaper 01 March 2018 Pages: 899 - 901
Approaches to detecting active network nodes in IPv6 address space D. V. IvanovD. A. MoskvinT. D. Ovasapyan OriginalPaper 01 March 2018 Pages: 902 - 906
Architectures for building secure vehicular networks based on SDN technology M. O. KalininV. M. KrundyshevP. V. Semianov OriginalPaper 01 March 2018 Pages: 907 - 914
Detection of encrypted executable files based on entropy analysis to determine the randomness measure of byte sequences I. V. AlekseevV. V. Platonov OriginalPaper 01 March 2018 Pages: 915 - 920
Data protection in radio channels of local differential satellite navigation subsystems I. A. SikarevS. F. Shakhnov OriginalPaper 01 March 2018 Pages: 921 - 927
Elliptic curves generation for isogeny-based cryptosystems E. B. AleksandrovaA. A. ShtyrkinaA. V. Yarmak OriginalPaper 01 March 2018 Pages: 928 - 935
Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing N. N. Shenets OriginalPaper 01 March 2018 Pages: 936 - 946
Methods of group authentication for low-resource vehicle and flying self-organizing networks E. B. Aleksandrova OriginalPaper 01 March 2018 Pages: 947 - 958
Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions A. P. BaranovP. A. Baranov OriginalPaper 01 March 2018 Pages: 959 - 964
A method of providing the integrity of information in the group of robotic engineering complexes based on crypt-code constructions D. V. SamoylenkoM. A. EremeevO. A. Finko OriginalPaper 01 March 2018 Pages: 965 - 971
X-PACE: Modified Password Authenticated Connection Establishment protocol N. N. ShenetsE. E. Trukhina OriginalPaper 01 March 2018 Pages: 972 - 977
Protection of Wi-Fi network users against rogue access points D. P. ZegzhdaD. A. MoskvinA. D. Dakhnovich OriginalPaper 01 March 2018 Pages: 978 - 984
Intelligent data analysis in decision support systems for penetration tests M. A. PoltavtsevaA. I. Pechenkin OriginalPaper 01 March 2018 Pages: 985 - 991
Modeling of information influence on remote wireless network devices M. E. SuhoparovN. A. BazhaevI. S. Lebedev OriginalPaper 01 March 2018 Pages: 992 - 999
Analysis of the constructing principles and methodology for evaluating the security of shoulder-surfing resistant graphic passwords V. A. YakovlevV. V. ArkhipovS. E. Adadurov OriginalPaper 01 March 2018 Pages: 1000 - 1010