Vol. 53, No. 8, 2019
Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
p. 857 abstract
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers
p. 865 abstract
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers
p. 870 abstract
Estimating the Probability of a Checksum Error in a Message
p. 874 abstract
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems
p. 879 abstract
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems
p. 883 abstract
Application of an Artificial Neural Network for Detection of Attacks in VANETs
p. 889 abstract
Modeling Big Data Management Systems in Information Security
p. 895 abstract
Big Data Management System Security Threat Model
p. 903 abstract
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
p. 914 abstract
Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures
p. 922 abstract
General Principles of Constructing a Motion Control System for a Remotely Operated Sea Vessel in the Port Area Based on the NMEA-2000 Network Protocol
p. 932 abstract
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
p. 937 abstract
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
p. 948 abstract
Benford’s Law in the Detection of DoS Attacks on Industrial Systems
p. 954 abstract
Detection of Security Threats to Modern Websites
p. 963 abstract
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users
p. 969 abstract
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
p. 972 abstract
Spoofing Attack on Eigenfaces-Based Biometric Identification System
p. 980 abstract
Model for Identifying Cyber Threats to Internet Information Resources
p. 987 abstract
Face Recognition Based on the Coefficient Tree for Three Scale Wavelet Transformation
p. 995 abstract
Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks
p. 1006 abstract
Preparing Datasets for Training in a Neural Network System of Intrusion Detection in Industrial Systems
p. 1012 abstract
Model of Cyberattacks on Digital Production Systems
p. 1017 abstract
Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model
p. 1020 abstract
Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks
p. 1023 abstract
Maintaining Cyber Sustainability in Industrial Systems Based on the Concept of Molecular-Genetic Control Systems
p. 1026 abstract
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions
p. 1029 abstract
Model and Method for Optimizing Computational Processes in Parallel Computing Systems
p. 1038 abstract
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls
p. 1045 abstract
Cloud-Based Data Architecture Security
p. 1056 abstract
Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters
p. 1065 abstract