Contents
Automatic Control and Computer Sciences


Vol. 49, No. 8, 2015

A simultaneous English language translation of this journal is available from Allerton Press, Inc.
Distributed worldwide by Springer. Automatic Control and Computer Sciences ISSN 0146-4116.


Efficiency Comparison of Optimum and Adaptive Methods
for Multichannel Signal Filtering

A. P. Baranov p. 615  abstract

Thermodynamic Approach to Modeling Multi-Agent Systems in Cyberspace

D. P. Zegzhda and T. V. Stepanova p. 622  abstract

Approach to the Construction of the Generalized Functional-Semantic
Cyber Security Model

P. D. Zegzhda, D. P. Zegzhda, and T. V. Stepanova p. 627  abstract

Resolving Semantic Inconsistencies in ELIBRARY.RU Based on Fuzzy Inference

A. D. Khomonenko, S. V. Voitsekhovskii, S. V. Logashev, and V. L. Dashonok p. 634  abstract

Using Risk-Oriented Approaches to Solve Information Security Problems

P. A. Baranov p. 643  abstract

Design and Verification of Protected Systems with Integrated Devices
Based on Expert Knowledge

V. A. Desnitskii and I. V. Kotenko p. 648  abstract

On Using the Stochastic Superindicator for Information Security Evaluation
in Automated Systems

M. A. Eremeev and I. E. Gorbachev p. 653  abstract

Approach to APCS Protection from Cyber Threats

D. P. Zegzhda and T. V. Stepanova p. 659  abstract

Automatic Security Management of Computer Systems

P. D. Zegzhda and M. O. Kalinin p. 665  abstract

Increasing the Fault Tolerance and Availability of Software Defined Networks
Using Network Equipment Control Based on Multiobjective
Optimization by Service Quality Parameters

M. O. Kalinin and E. Yu. Pavlenko p. 673  abstract

Access Control Method in Distributed Grid Computing Networks

A. S. Konoplev and M. O. Kalinin p. 679  abstract

Secure Processor Architecture Modeling for Large-Scale Systems

D. Moskvin, D. Zegzhda, and A. Nikolskiy p. 684  abstract

Support of the Integrity of Administrative Information in Intensive
Data Exchange with RDBMS Clients

M. A. Poltavtseva p. 690  abstract

Analytical Review of Methods of Providing Internet Anonymity

I. I. Savchenko and O. Yu. Gatsenko p. 696  abstract

Attack Tree-Based Approach for Real-Time Security Event Processing

A. A. Chechulin and I. V. Kotenko p. 701  abstract

Method of Security Against Computer Attacks Based on an Analysis
of Executable Machine Code

V. Yu. Aranov and V. S. Zaborovsky p. 705  abstract

Multilevel Modeling of Preemptive Scenarios

D. N. Biryukov, A. G. Lomako, and T. R. Sabirov p. 709 abstract

Maintenance of Sustainable Operation of Pipeline-Parallel Computing Systems
in the Cloud Environment

N. S. Vert, A. S. Volkova, D. P. Zegzhda, and M. O. Kalinin p. 713  abstract

Universal National Security Platform for Distributed Information
and Telecommunication Systems

A. S. Konoplev p. 721  abstract

Adaptive Reflexivity Threat Protection

D. S. Lavrova and A. I. Pechenkin p. 727  abstract

Applying Correlation Analysis Methods to Control flow Violation Detection
in the Internet of Things

D. Lavrova, A. Pechenkin, and V. Gluhov p. 735  abstract

Model of Hidden IT Security Threats in the Cloud Computing Environment

A. S. Molyakov, V. S. Zaborovsky, and A. A. Lukashin p. 741  abstract

Methods of Protecting Self-Organizing Networks Against Attacks on Traffic Routing

D. A. Moskvin and D. V. Ivanov p. 745  abstract

Formal Model of Cyber Attacks on Virtualization Tools and a Measure
of Hypervisor Vulnerability

A. V. Nikolskiy and Yu. S. Vasil’ev p. 751  abstract

Architecture of a Scalable System of Fuzzing Network Protocols
on a Multiprocessor Cluster

A. I. Pechenkin and A. V. Nikolskiy p. 758  abstract

Using Data-Mining Methods to Detect Network Attacks

V. V. Platonov and P. O. Semenov p. 766  abstract

Organization of Revocation for Lattice-based Group Signature Scheme

E. B. Aleksandrova and E. A. Kuznetsova p. 770  abstract

Using Adaptive Filtering of Signals for Estimation of the Mahalanobis Distance

A. P. Baranov p. 778  abstract

Study of Countermeasures against Covert Channels in IP Networks

A. V. Epishkina and K. G. Kogos p. 785  abstract

Analysis of Broadcast Schemes that Implement Identity-Based Encryption Algorithms

A. N. Kulakov and E. B. Aleksandrova p. 790  abstract

Ideal Composite Modular Secret Sharing Schemes

N. N. Shenets p. 798  abstract

User Authentication Based on the Chess Graphical Password Scheme
Resistant to Shoulder Surfing

V. A. Yakovlev and V. V. Arkhipov p. 803  abstract

Mechanism of Establishing Authorship of Short Messages Posted by Users of Internet Portals
by Methods of Mathematical Linguistics

M. E. Sukhoparov p. 813  abstract

Detection of Anomalies in Behavior of the Software with Usage of Markov Chains

P. D. Zegzhda, S. S. Kort, and A. F. Suprun p. 820  abstract

Modeling the Search for Vulnerabilities via the Fuzzing Method Using an Automation
Representation of Network Protocols

A. I. Pechenkin and D. S. Lavrova p. 826  abstract

The Use of Virtualization Technology in the Dynamic Analysis of Software Code

A. Yu. Chernov and A. S. Konoplev p. 834 abstract


Pleiades Publishing home page | journal home page | top

If you have any problems with this server, contact webmaster.