Contents

Automatic Control and Computer Sciences


Vol. 52, No. 8, 2018

A simultaneous English language translation of this journal is available from Pleiades Publishing, Ltd.
Distributed worldwide by Springer. Automatic Control and Computer Sciences ISSN 0146-4116.


The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity

P. D. Zegzhda, D. V. Ivanov, D. A. Moskvin, and A. A. Ivanov p. 901  abstract

Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks

M. O. Kalinin, V. M. Krundyshev, E. Yu. Rezedinova, and D. V. Reshetov p. 906  abstract

Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series

M. O. Kalinin, D. S. Lavrova, and A. V. Yarmak p. 912  abstract

A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems

P. D. Zegzhda, M. A. Poltavtseva, A. I. Pechenkin, D. S. Lavrova, and E. A. Zaitseva p. 918  abstract

Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation

D. S. Lavrova, I. V. Alekseev, and A. A. Shtyrkina p. 931  abstract

Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks

P. D. Zegzhda, D. S. Lavrova, and A. A. Shtyrkina p. 936  abstract

A Distributed Intrusion Detection System with Protection from an Internal Intruder

S. I. Shterenberg and M. A. Poltavtseva p. 945  abstract

Using Neural Networks to Detect Internal Intruders in VANETs

T. D. Ovasapyan, D. A. Moskvin, and M. O. Kalinin p. 954  abstract

Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices

V. V. Platonov and P. O. Semenov p. 959  abstract

Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security

R. A. Demidov, A. I. Pechenkin, P. D. Zegzhda, and M. O. Kalinin p. 965  abstract

Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model

R. A. Demidov, P. D. Zegzhda, and M. O. Kalinin p. 971  abstract

Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence

M. O. Kalinin, E. A. Zubkov, A. F. Suprun, and A. I. Pechenkin p. 977  abstract

Cyber-sustainability of Software-Defined Networks Based on Situational Management

D. P. Zegzhda and E. Yu. Pavlenko p. 984  abstract

Actual Security Threats for Vehicular and Mobile Ad Hoc Networks

P. D. Zegzhda, D. V. Ivanov, D. A. Moskvin, and G. S. Kubrin p. 993  abstract

Approaches to Modeling the Security of Cyberphysical Systems

D. P. Zegzhda, Yu. S. Vasil’ev, and M. A. Poltavtseva p. 1000  abstract

An Approach to the Programs Security Analysis using Vector Representation of Machine Code

R. A. Demidov and A. I. Pechenkin p. 1010  abstract

A Blockchain Decentralized Public Key Infrastructure Model

A. S. Konoplev, A. G. Busygin, and D. P. Zegzhda p. 1017  abstract

An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code

R. A. Demidov, A. I. Pechenkin, and P. D. Zegzhda p. 1022  abstract

Modeling the Dissemination of Information Threats in Social Media

I. I. Falcone and O. Yu. Gatsenko p. 1029  abstract

Ensuring Secure Data Input/Output Operations for SGX ENCLAVE

D. P. Zegzhda, E. S. Usov, A. V. Nikol’skii, and E. Yu. Pavlenko p. 1036  abstract

Security Provision in Wireless Sensor Networks on the Basis of the Trust Model

T. D. Ovasapyan and D. V. Ivanov p. 1042  abstract

CRC Error Probability under Batch Random Noise

A. P. Baranov and P. A. Baranov p. 1049  abstract

Directed Digital Signature on Isogenies of Elliptic Curves

E. B. Aleksandrova and A. A. Shtyrkina p. 1059  abstract

Security of a Key System of a Fiscal Feature

V. S. Gorbatov, I. Yu. Zhukov, and O. N. Murashov p. 1065  abstract

Analysis of the Information Security Threats in the Digital Production Networks

A. D. Dakhnovich, D. A. Moskvin, and D. P. Zegzhda p. 1071  abstract

Protection of Valuable Information in Information Technologies

A. A. Grusho, N. A. Grusho, M. I. Zabezhaylo, and E. E. Timonina p. 1076  abstract

Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph

A. G. Busygin, A. S. Konoplev, and D. P. Zegzhda p. 1080  abstract

Noise Immunity of Noncoherent Reception under Complex Interference Effect on Communication and Monitoring Channels of Automated Information Systems of River Transport on Inland Waterways of the Russian Federation

A. A. Sikarev, I. A. Sikarev, and A. V. Garanin p. 1084  abstract

Problems of Security in Digital Production and Its Resistance to Cyber Threats

Yu. S. Vasil’ev, D. P. Zegzhda, and M. A. Poltavtseva p. 1090  abstract

Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem

K. I. Salakhutdinova, I. S. Lebedev, I. E. Krivtsova, and M. E. Sukhoparov p. 1101  abstract

The Problem of Innovative Development of Information Security Systems in the Transport Sector

V. G. Anisimov, E. G. Anisimov, P. D. Zegzhda, and A. F. Suprun p. 1105  abstract

Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology

D. P. Zegzhda, D. A. Moskvin, and A. V. Myasnikov p. 1111  abstract

Development of a Heuristic Mechanism for Detection of Malware Programs Based on Hidden Markov Models

A. V. Kozachok p. 1117  abstract

Implementation of Mandatory Access Control in Distributed Systems

S. V. Belim and S. Yu. Belim p. 1124  abstract

Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network

A. D. Dakhnovich, D. P. Zegzhda, and D. A. Moskvin p. 1127  abstract

Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels

S. V. Belim and S. Yu. Belim p. 1134  abstract

Use of Statistical Processing of Reference Images in Biometric Authentication Systems

V. P. Los’, G. V. Ross, and E. D. Tyshuk p. 1138  abstract

Architecture of the Protected Cloud Data Storage Using Intel SGX Technology

E. S. Usov, A. V. Nikol’skii, E. Yu. Pavlenko, and D. P. Zegzhda p. 1144  abstract

Digital Manufacturing Security Indicators

D. P. Zegzhda and E. Yu. Pavlenko p. 1150  abstract

Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations

E. B. Aleksandrova and E. N. Shkorkina p. 1160  abstract

Application of Systems Theory Laws for Investigating Information Security Problems

V. N. Volkova and Yu. Yu. Chernyi p. 1164  abstract