Contents

Automatic Control and Computer Sciences


Vol. 50, No. 8, 2016

A simultaneous English language translation of this journal is available from Pleiades Publishing, Ltd.
Distributed worldwide by Springer. Automatic Control and Computer Sciences ISSN 0146-4116.


Management of Information Security Risks in a Context of Uncertainty

I. M. Azhmukhamedov, O. N. Vybornova and Yu. M. Brumshtein p. 657  abstract

Access Control System for Distributed Computing Networks

A. S. Konoplev and M. O. Kalinin p. 664  abstract

Tasks of Providing Information Security in Distributed Computing Networks

A. S. Konoplev and M. O. Kalinin p. 669  abstract

An Approach to Developing the SIEM System for the Internet of Things

D. S. Lavrova p. 673  abstract

A Prototype Computer with Non-von Neumann Architecture Based on Strategic Domestic J7 Microprocessor

A. S. Molyakov p. 682  abstract

Token Scanning as a New Scientific Approach in the Creation of Protected Systems: A New Generation OS MICROTEK

A. S. Molyakov p. 687  abstract

Development of Automated System for Identifying Abnormal Network Activity and Detecting Threats

V. V. Nikonov, V. P. Los’ and G. V. Ross p. 693  abstract

Planning of Aggregation and Normalization of Data from the Internet of Things for Processing on a Multiprocessor Cluster

M. A. Poltavtseva, D. S. Lavrova and A. I. Pechenkin p. 703  abstract

Information Security of Data Channels Based on a Multifunctional Tailored Software and Hardware Solution

M. E. Sukhoparov, I. S. Lebedev, V. M. Korzhuk and I. E. Krivtsova p. 712  abstract

A Risk-Oriented Approach to the Control Arrangement of Security Protection Subsystems of Information Systems

V. G. Anisimov, P. D. Zegzhda, E. G. Anisimov and D. A. Bazhin p. 717  abstract

Intelligent Data Analysis in Information Security

A. A. Grusho, N. A. Grusho, M. I. Zabezhailo and E. E. Timonina p. 722  abstract

Detection of Anomalous Behavior in a Robot System Based on Deep Learning Elements

L. V. Utkin, V. S. Zaborovskii and S. G. Popov p. 726  abstract

Technology of Security Services Virtualization for High-Speed Computer Networks

P. D. Zegzhda and M. O. Kalinin p. 734  abstract

Applying the Group Signature for Entity Authentication in Distributed Grid Computing Networks

E. B. Aleksandrova, D. P. Zegzhda and A. S. Konoplev p. 739  abstract

Approaches to Protection of Applications Based on the TLS Protocol against Attacks Using Revoked Certificates

A. G. Busygin, A. S. Konoplev and M. O. Kalinin p. 743  abstract

Attainable Upper Estimate of the Degree of Distinguishability of a Connected Permutation Automaton

A. V. Babash p. 749  abstract

Asymptotic Assessments of CRC Error Probabilities in Some Telecommunication Protocols

A. P. Baranov and P. A. Baranov p. 759  abstract

Assessment of CRC Error Probability at Minor Distortion of Information

A. P. Baranov and P. A. Baranov p. 765  abstract

KDP Scheme of Preliminary Key Distribution in Discretionary Security Policy

S. V. Belim and S. Yu. Belim p. 773  abstract

Distribution of Cryptographic Keys in Systems with a Hierarchy of Objects

S. V. Belim and N. F. Bogachenko p. 777  abstract

User Identification and Authentication System Based on a Hybrid Fuzzy Approach

K. S. Sumkin, V. P. Los’ and G. V. Ross p. 787  abstract

Implementation of Symmetric Encryption by State Standard 28147–89 Algorithm on a Graphical Processor

M. E. Sukhoparov and I. S. Lebedev p. 792  abstract

Tripartite Outsoursing Key-Agreement Protocol on Bilinear Pairings

E. B. Aleksandrova and E. N. Shkorkina p. 796  abstract

A Text Steganography Method Based on Markov Chains

A. N. Shniperov and K. A. Nikitina p. 802  abstract

Multiagent System Controllability Evaluation Using the Multilevel Structure of the Graph of Agents

D. P. Zegzhda, T. V. Stepanova and A. F. Suprun p. 809  abstract

Sustainability as a Criterion for Information Security in Cyber-Physical Systems

D. P. Zegzhda p. 813  abstract