Vol. 52, No. 8, 2018
A simultaneous English language translation of this journal is available from Pleiades Publishing, Ltd.
Distributed worldwide by Springer. Automatic Control and Computer Sciences ISSN 0146-4116.
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity
p. 901 abstract
Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks
p. 906 abstract
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series
p. 912 abstract
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
p. 918 abstract
Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation
p. 931 abstract
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks
p. 936 abstract
A Distributed Intrusion Detection System with Protection from an Internal Intruder
p. 945 abstract
Using Neural Networks to Detect Internal Intruders in VANETs
p. 954 abstract
Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices
p. 959 abstract
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security
p. 965 abstract
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model
p. 971 abstract
Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence
p. 977 abstract
Cyber-sustainability of Software-Defined Networks Based on Situational Management
p. 984 abstract
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks
p. 993 abstract
Approaches to Modeling the Security of Cyberphysical Systems
p. 1000 abstract
An Approach to the Programs Security Analysis using Vector Representation of Machine Code
p. 1010 abstract
A Blockchain Decentralized Public Key Infrastructure Model
p. 1017 abstract
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code
p. 1022 abstract
Modeling the Dissemination of Information Threats in Social Media
p. 1029 abstract
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE
p. 1036 abstract
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model
p. 1042 abstract
CRC Error Probability under Batch Random Noise
p. 1049 abstract
Directed Digital Signature on Isogenies of Elliptic Curves
p. 1059 abstract
Security of a Key System of a Fiscal Feature
p. 1065 abstract
Analysis of the Information Security Threats in the Digital Production Networks
p. 1071 abstract
Protection of Valuable Information in Information Technologies
p. 1076 abstract
Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph
p. 1080 abstract
Noise Immunity of Noncoherent Reception under Complex Interference Effect on Communication and Monitoring Channels of Automated Information Systems of River Transport on Inland Waterways of the Russian Federation
p. 1084 abstract
Problems of Security in Digital Production and Its Resistance to Cyber Threats
p. 1090 abstract
Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem
p. 1101 abstract
The Problem of Innovative Development of Information Security Systems in the Transport Sector
p. 1105 abstract
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology
p. 1111 abstract
Development of a Heuristic Mechanism for Detection of Malware Programs Based on Hidden Markov Models
p. 1117 abstract
Implementation of Mandatory Access Control in Distributed Systems
p. 1124 abstract
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
p. 1127 abstract
Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels
p. 1134 abstract
Use of Statistical Processing of Reference Images in Biometric Authentication Systems
p. 1138 abstract
Architecture of the Protected Cloud Data Storage Using Intel SGX Technology
p. 1144 abstract
Digital Manufacturing Security Indicators
p. 1150 abstract
Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations
p. 1160 abstract
Application of Systems Theory Laws for Investigating Information Security Problems
p. 1164 abstract