Contents

Automatic Control and Computer Sciences


Vol. 51, No. 8, 2017

A simultaneous English language translation of this journal is available from Pleiades Publishing, Ltd.
Distributed worldwide by Springer. Automatic Control and Computer Sciences ISSN 0146-4116.


Information Security Architecture Synthesis in Distributed Information Computation Systems

A. A. Grusho, N. A. Grusho and E. E. Timonina p. 799  abstract

Cyber-Physical System Homeostatic Security Management

D. P. Zegzhda and E. Yu. Pavlenko p. 805  abstract

An Ontological Model of the Domain of Applications for the Internet of Things in Analyzing Information Security

D. S. Lavrova and Yu. S. Vasil’ev p. 817  abstract

Indices of the Effectiveness of Information Protection in an Information Interaction System for Controlling Complex Distributed Organizational Objects

V. G. Anisimov, E. G. Anisimov, P. D. Zegzhda, T. N. Saurenko and S. P. Prisyazhnyuk p. 824  abstract

Hierarchical Approach to Analyzing Security Breaches in Information Systems

E. Yu. Pavlenko, A. V. Yarmak and D. A. Moskvin p. 829  abstract

Systematization and Security Assessment of Cyber-Physical Systems

D. P. Zegzhda, M. A. Poltavtseva and D. S. Lavrova p. 835  abstract

The Task of Building a Trusted Computing Environment on the Intel Hardware Platform

A. Yu. Chernov, A. S. Konoplev and D. V. Reshetov p. 844  abstract

Use of Intel SGX to Ensure the Confidentiality of Data of Cloud Users

D. P. Zegzhda, E. S. Usov, A. V. Nikol’skii and E. Yu. Pavlenko p. 848  abstract

Applying NFC for Automated Replication of User Data

D. V. Ivanov, D. A. Moskvin, A. V. Myasnikov and A. F. Suprun p. 855  abstract

Identifying a Potential Insider Using Classification Models

A. S. Zaytsev and A. A. Malyuk p. 860  abstract

Application of Clustering Methods for Analyzing the Security of Android Applications

E. Yu. Pavlenko, A. V. Yarmak and D. A. Moskvin p. 867  abstract

The Use of an Artificial Neural Network to Detect Automatically Managed Accounts in Social Networks

P. D. Zegzhda, E. V. Malyshev and E. Yu. Pavlenko p. 874  abstract

Siamese Neural Network for Intelligent Information Security Control in Multi-Robot Systems

L. V. Utkin, V. S. Zaborovsky and S. G. Popov p. 881  abstract

Application of Convolutional Neural Networks for Preventing Information Leakage in Open Internet Resources

D. O. Zhukov, D. A. Akimov, O. K. Red’kin and V. P. Los’ p. 888  abstract

An Adaptive Model of a Distributed Intrusion Detection System

V. V. Platonov and P. O. Semenov p. 894  abstract

Security Evaluation of a Wireless Ad-Hoc Network with Dynamic Topology

M. O. Kalinin and A. A. Minin p. 899  abstract

Approaches to Detecting Active Network Nodes in IPv6 Address Space

D. V. Ivanov, D. A. Moskvin and T. D. Ovasapyan p. 902  abstract

Architectures for Building Secure Vehicular Networks Based on SDN Technology

M. O. Kalinin, V. M. Krundyshev and P. V. Semianov p. 907  abstract

Detection of Encrypted Executable Files Based on Entropy Analysis to Determine the Randomness Measure of Byte Sequences

I. V. Alekseev and V. V. Platonov p. 915  abstract

Data Protection in Radio Channels of Local Differential Satellite Navigation Subsystems

I. A. Sikarev and S. F. Shakhnov p. 921  abstract

Elliptic Curves Generation for Isogeny-Based Cryptosystems

E. B. Aleksandrova, A. A. Shtyrkina and A. V. Yarmak p. 928  abstract

Authentication in Dynamic Peer-to-Peer Networks Based on Homomorphic Secret Sharing

N. N. Shenets p. 936  abstract

Methods of Group Authentication for Low-Resource Vehicle and Flying Self-Organizing Networks

E. B. Aleksandrova p. 947  abstract

Models of the Formation of CRC Values and Monitoring Sums under the Conditions of Multiple Distortions

A. P. Baranov and P. A. Baranov p. 959  abstract

A Method of Providing the Integrity of Information in the Group of Robotic Engineering Complexes Based on Crypt-Code Constructions

D. V. Samoylenko, M. A. Eremeev and O. A. Finko p. 965  abstract

X-PACE: Modified Password Authenticated Connection Establishment Protocol

N. N. Shenets and E. E. Trukhina p. 972  abstract

Protection of Wi-Fi Network Users Against Rogue Access Points

D. P. Zegzhda, D. A. Moskvin and A. D. Dakhnovich p. 978  abstract

Intelligent Data Analysis in Decision Support Systems for Penetration Tests

M. A. Poltavtseva and A. I. Pechenkin p. 985  abstract

Modeling of Information Influence on Remote Wireless Network Devices

M. E. Suhoparov, N. A. Bazhaev, I. E. Krivtsova and I. S. Lebedev p. 992  abstract

Analysis of the Constructing Principles and Methodology for Evaluating the Security of Shoulder-Surfing Resistant Graphic Passwords

V. A. Yakovlev, V. V. Arkhipov and S. E. Adadurov p. 1000  abstract