Contents

Automatic Control and Computer Sciences


Vol. 52, No. 8, 2018

A simultaneous English language translation of this journal is available from Pleiades Publishing, Ltd.
Distributed worldwide by Springer. Automatic Control and Computer Sciences ISSN 0146-4116.


The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity

P. D. Zegzhda, D. V. Ivanov, D. A. Moskvin and A. A. Ivanov p. 901  abstract

Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks

M. O. Kalinin, V. M. Krundyshev, E. Yu. Rezedinova and D. V. Reshetov p. 906  abstract

Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series

M. O. Kalinin, D. S. Lavrova and A. V. Yarmak p. 912  abstract

A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems

P. D. Zegzhda, M. A. Poltavtseva, A. I. Pechenkin, D. S. Lavrova and E. A. Zaitseva p. 918  abstract

Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation

D. S. Lavrova, I. V. Alekseev and A. A. Shtyrkina p. 931  abstract

Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks

P. D. Zegzhda, D. S. Lavrova and A. A. Shtyrkina p. 936  abstract

A Distributed Intrusion Detection System with Protection from an Internal Intruder

S. I. Shterenberg and M. A. Poltavtseva p. 945  abstract

Using Neural Networks to Detect Internal Intruders in VANETs

T. D. Ovasapyan, D. A. Moskvin and M. O. Kalinin p. 954  abstract

Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices

V. V. Platonov and P. O. Semenov p. 959  abstract

Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security

R. A. Demidov, A. I. Pechenkin, P. D. Zegzhda and M. O. Kalinin p. 965  abstract

Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model

R. A. Demidov, P. D. Zegzhda and M. O. Kalinin p. 971  abstract

Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence

M. O. Kalinin, E. A. Zubkov, A. F. Suprun and A. I. Pechenkin p. 977  abstract

Cyber-sustainability of Software-Defined Networks Based on Situational Management

D. P. Zegzhda and E. Yu. Pavlenko p. 984  abstract

Actual Security Threats for Vehicular and Mobile Ad Hoc Networks

P. D. Zegzhda, D. V. Ivanov, D. A. Moskvin and G. S. Kubrin p. 993  abstract

Approaches to Modeling the Security of Cyberphysical Systems

D. P. Zegzhda, Yu. S. Vasil’ev and M. A. Poltavtseva p. 1000  abstract

An Approach to the Programs Security Analysis using Vector Representation of Machine Code

R. A. Demidov and A. I. Pechenkin p. 1010  abstract

A Blockchain Decentralized Public Key Infrastructure Model

A. S. Konoplev, A. G. Busygin and D. P. Zegzhda p. 1017  abstract

An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code

R. A. Demidov, A. I. Pechenkin and P. D. Zegzhda p. 1022  abstract

Modeling the Dissemination of Information Threats in Social Media

I. I. Falcone and O. Yu. Gatsenko p. 1029  abstract

Ensuring Secure Data Input/Output Operations for SGX ENCLAVE

D. P. Zegzhda, E. S. Usov, A. V. Nikol’skii and E. Yu. Pavlenko p. 1036  abstract

Security Provision in Wireless Sensor Networks on the Basis of the Trust Model

T. D. Ovasapyan and D. V. Ivanov p. 1042  abstract

CRC Error Probability under Batch Random Noise

A. P. Baranov and P. A. Baranov p. 1049  abstract

Directed Digital Signature on Isogenies of Elliptic Curves

E. B. Aleksandrova and A. A. Shtyrkina p. 1059  abstract

Security of a Key System of a Fiscal Feature

V. S. Gorbatov, I. Yu. Zhukov and O. N. Murashov p. 1065  abstract

Analysis of the Information Security Threats in the Digital Production Networks

A. D. Dakhnovich, D. A. Moskvin and D. P. Zegzhda p. 1071  abstract

Protection of Valuable Information in Information Technologies

A. A. Grusho, N. A. Grusho, M. I. Zabezhaylo and E. E. Timonina p. 1076  abstract

Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph

A. G. Busygin, A. S. Konoplev and D. P. Zegzhda p. 1080  abstract

Noise Immunity of Noncoherent Reception under Complex Interference Effect on Communication and Monitoring Channels of Automated Information Systems of River Transport on Inland Waterways of the Russian Federation

A. A. Sikarev, I. A. Sikarev and A. V. Garanin p. 1084  abstract

Problems of Security in Digital Production and Its Resistance to Cyber Threats

Yu. S. Vasil’ev, D. P. Zegzhda and M. A. Poltavtseva p. 1090  abstract

Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem

K. I. Salakhutdinova, I. S. Lebedev, I. E. Krivtsova and M. E. Sukhoparov p. 1101  abstract

The Problem of Innovative Development of Information Security Systems in the Transport Sector

V. G. Anisimov, E. G. Anisimov, P. D. Zegzhda and A. F. Suprun p. 1105  abstract

Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology

D. P. Zegzhda, D. A. Moskvin and A. V. Myasnikov p. 1111  abstract

Development of a Heuristic Mechanism for Detection of Malware Programs Based on Hidden Markov Models

A. V. Kozachok p. 1117  abstract

Implementation of Mandatory Access Control in Distributed Systems

S. V. Belim and S. Yu. Belim p. 1124  abstract

Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network

A. D. Dakhnovich, D. P. Zegzhda and D. A. Moskvin p. 1127  abstract

Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels

S. V. Belim and S. Yu. Belim p. 1134  abstract

Use of Statistical Processing of Reference Images in Biometric Authentication Systems

V. P. Los’, G. V. Ross and E. D. Tyshuk p. 1138  abstract

Architecture of the Protected Cloud Data Storage Using Intel SGX Technology

E. S. Usov, A. V. Nikol’skii, E. Yu. Pavlenko and D. P. Zegzhda p. 1144  abstract

Digital Manufacturing Security Indicators

D. P. Zegzhda and E. Yu. Pavlenko p. 1150  abstract

Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations

E. B. Aleksandrova and E. N. Shkorkina p. 1160  abstract

Application of Systems Theory Laws for Investigating Information Security Problems

V. N. Volkova and Yu. Yu. Chernyi p. 1164  abstract