Vol. 51, No. 8, 2017
A simultaneous English language translation of this journal is available from Pleiades Publishing, Ltd.
Distributed worldwide by Springer. Automatic Control and Computer Sciences ISSN 0146-4116.
Information Security Architecture Synthesis in Distributed Information Computation Systems
p. 799 abstract
Cyber-Physical System Homeostatic Security Management
p. 805 abstract
An Ontological Model of the Domain of Applications for the Internet of Things in Analyzing Information Security
p. 817 abstract
Indices of the Effectiveness of Information Protection in an Information Interaction System for Controlling Complex Distributed Organizational Objects
p. 824 abstract
Hierarchical Approach to Analyzing Security Breaches in Information Systems
p. 829 abstract
Systematization and Security Assessment of Cyber-Physical Systems
p. 835 abstract
The Task of Building a Trusted Computing Environment on the Intel Hardware Platform
p. 844 abstract
Use of Intel SGX to Ensure the Confidentiality of Data of Cloud Users
p. 848 abstract
Applying NFC for Automated Replication of User Data
p. 855 abstract
Identifying a Potential Insider Using Classification Models
p. 860 abstract
Application of Clustering Methods for Analyzing the Security of Android Applications
p. 867 abstract
The Use of an Artificial Neural Network to Detect Automatically Managed Accounts in Social Networks
p. 874 abstract
Siamese Neural Network for Intelligent Information Security Control in Multi-Robot Systems
p. 881 abstract
Application of Convolutional Neural Networks for Preventing Information Leakage in Open Internet Resources
p. 888 abstract
An Adaptive Model of a Distributed Intrusion Detection System
p. 894 abstract
Security Evaluation of a Wireless Ad-Hoc Network with Dynamic Topology
p. 899 abstract
Approaches to Detecting Active Network Nodes in IPv6 Address Space
p. 902 abstract
Architectures for Building Secure Vehicular Networks Based on SDN Technology
p. 907 abstract
Detection of Encrypted Executable Files Based on Entropy Analysis to Determine the Randomness Measure of Byte Sequences
p. 915 abstract
Data Protection in Radio Channels of Local Differential Satellite Navigation Subsystems
p. 921 abstract
Elliptic Curves Generation for Isogeny-Based Cryptosystems
p. 928 abstract
Authentication in Dynamic Peer-to-Peer Networks Based on Homomorphic Secret Sharing
p. 936 abstract
Methods of Group Authentication for Low-Resource Vehicle and Flying Self-Organizing Networks
p. 947 abstract
Models of the Formation of CRC Values and Monitoring Sums under the Conditions of Multiple Distortions
p. 959 abstract
A Method of Providing the Integrity of Information in the Group of Robotic Engineering Complexes Based on Crypt-Code Constructions
p. 965 abstract
X-PACE: Modified Password Authenticated Connection Establishment Protocol
p. 972 abstract
Protection of Wi-Fi Network Users Against Rogue Access Points
p. 978 abstract
Intelligent Data Analysis in Decision Support Systems for Penetration Tests
p. 985 abstract
Modeling of Information Influence on Remote Wireless Network Devices
p. 992 abstract
Analysis of the Constructing Principles and Methodology for Evaluating the Security of Shoulder-Surfing Resistant Graphic Passwords
p. 1000 abstract