Contents
Automatic Control and Computer Sciences
Vol. 49, No. 8, 2015
A simultaneous English language translation of this journal is available from Allerton Press, Inc.
Distributed worldwide by Springer. Automatic Control and Computer Sciences ISSN 0146-4116.
Efficiency Comparison of Optimum and Adaptive Methods
for Multichannel Signal Filtering
A. P. Baranov p. 615 abstract
Thermodynamic Approach to Modeling Multi-Agent Systems in Cyberspace
D. P. Zegzhda and T. V. Stepanova p. 622 abstract
Approach to the Construction of the Generalized Functional-Semantic
Cyber Security Model
P. D. Zegzhda, D. P. Zegzhda, and T. V. Stepanova p. 627 abstract
Resolving Semantic Inconsistencies in ELIBRARY.RU Based on Fuzzy Inference
A. D. Khomonenko, S. V. Voitsekhovskii, S. V. Logashev, and V. L. Dashonok p. 634 abstract
Using Risk-Oriented Approaches to Solve Information Security Problems
P. A. Baranov p. 643 abstract
Design and Verification of Protected Systems with Integrated Devices
Based on Expert Knowledge
V. A. Desnitskii and I. V. Kotenko p. 648 abstract
On Using the Stochastic Superindicator for Information Security Evaluation
in Automated Systems
M. A. Eremeev and I. E. Gorbachev p. 653 abstract
Approach to APCS Protection from Cyber Threats
D. P. Zegzhda and T. V. Stepanova p. 659 abstract
Automatic Security Management of Computer Systems
P. D. Zegzhda and M. O. Kalinin p. 665 abstract
Increasing the Fault Tolerance and Availability of Software Defined Networks
Using Network Equipment Control Based on Multiobjective
Optimization by Service Quality Parameters
M. O. Kalinin and E. Yu. Pavlenko p. 673 abstract
Access Control Method in Distributed Grid Computing Networks
A. S. Konoplev and M. O. Kalinin p. 679 abstract
Secure Processor Architecture Modeling for Large-Scale Systems
D. Moskvin, D. Zegzhda, and A. Nikolskiy p. 684 abstract
Support of the Integrity of Administrative Information in Intensive
Data Exchange with RDBMS Clients
M. A. Poltavtseva p. 690 abstract
Analytical Review of Methods of Providing Internet Anonymity
I. I. Savchenko and O. Yu. Gatsenko p. 696 abstract
Attack Tree-Based Approach for Real-Time Security Event Processing
A. A. Chechulin and I. V. Kotenko p. 701 abstract
Method of Security Against Computer Attacks Based on an Analysis
of Executable Machine Code
V. Yu. Aranov and V. S. Zaborovsky p. 705 abstract
Multilevel Modeling of Preemptive Scenarios
D. N. Biryukov, A. G. Lomako, and T. R. Sabirov p. 709 abstract
Maintenance of Sustainable Operation of Pipeline-Parallel Computing Systems
in the Cloud Environment
N. S. Vert, A. S. Volkova, D. P. Zegzhda, and M. O. Kalinin p. 713 abstract
Universal National Security Platform for Distributed Information
and Telecommunication Systems
A. S. Konoplev p. 721 abstract
Adaptive Reflexivity Threat Protection
D. S. Lavrova and A. I. Pechenkin p. 727 abstract
Applying Correlation Analysis Methods to Control flow Violation Detection
in the Internet of Things
D. Lavrova, A. Pechenkin, and V. Gluhov p. 735 abstract
Model of Hidden IT Security Threats in the Cloud Computing Environment
A. S. Molyakov, V. S. Zaborovsky, and A. A. Lukashin p. 741 abstract
Methods of Protecting Self-Organizing Networks Against Attacks on Traffic Routing
D. A. Moskvin and D. V. Ivanov p. 745 abstract
Formal Model of Cyber Attacks on Virtualization Tools and a Measure
of Hypervisor Vulnerability
A. V. Nikolskiy and Yu. S. Vasilev p. 751 abstract
Architecture of a Scalable System of Fuzzing Network Protocols
on a Multiprocessor Cluster
A. I. Pechenkin and A. V. Nikolskiy p. 758 abstract
Using Data-Mining Methods to Detect Network Attacks
V. V. Platonov and P. O. Semenov p. 766 abstract
Organization of Revocation for Lattice-based Group Signature Scheme
E. B. Aleksandrova and E. A. Kuznetsova p. 770 abstract
Using Adaptive Filtering of Signals for Estimation of the Mahalanobis Distance
A. P. Baranov p. 778 abstract
Study of Countermeasures against Covert Channels in IP Networks
A. V. Epishkina and K. G. Kogos p. 785 abstract
Analysis of Broadcast Schemes that Implement Identity-Based Encryption Algorithms
A. N. Kulakov and E. B. Aleksandrova p. 790 abstract
Ideal Composite Modular Secret Sharing Schemes
N. N. Shenets p. 798 abstract
User Authentication Based on the Chess Graphical Password Scheme
Resistant to Shoulder Surfing
V. A. Yakovlev and V. V. Arkhipov p. 803 abstract
Mechanism of Establishing Authorship of Short Messages Posted by Users of Internet Portals
by Methods of Mathematical Linguistics
M. E. Sukhoparov p. 813 abstract
Detection of Anomalies in Behavior of the Software with Usage of Markov Chains
P. D. Zegzhda, S. S. Kort, and A. F. Suprun p. 820 abstract
Modeling the Search for Vulnerabilities via the Fuzzing Method Using an Automation
Representation of Network Protocols
A. I. Pechenkin and D. S. Lavrova p. 826 abstract
The Use of Virtualization Technology in the Dynamic Analysis of Software Code
A. Yu. Chernov and A. S. Konoplev p. 834 abstract
Pleiades Publishing home page | journal home page | top
If you have any problems with this server, contact webmaster.