Contents

Automatic Control and Computer Sciences


Vol. 53, No. 8, 2019


Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption

N. N. Shenets p. 857  abstract

Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers

I. D. Pankov, A. S. Konoplev and A. Yu. Chernov p. 865  abstract

On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers

V. A. Lokhvitskii, A. D. Khomonenko and M. A. Bol’shakov p. 870  abstract

Estimating the Probability of a Checksum Error in a Message

A. P. Baranov and P. A. Baranov p. 874  abstract

Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems

E. B. Aleksandrova, A. V. Yarmak and M. O. Kalinin p. 879  abstract

Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems

Sh. G. Magomedov and V. P. Los’ p. 883  abstract

Application of an Artificial Neural Network for Detection of Attacks in VANETs

E. V. Malyshev, D. A. Moskvin and D. P. Zegzhda p. 889  abstract

Modeling Big Data Management Systems in Information Security

M. A. Poltavtseva and M. O. Kalinin p. 895  abstract

Big Data Management System Security Threat Model

M. A. Poltavtseva, D. P. Zegzhda and M. O. Kalinin p. 903  abstract

A Consistent Approach to Building Secure Big Data Processing and Storage Systems

M. A. Poltavtseva p. 914  abstract

Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures

N. A. Grusho p. 922  abstract

General Principles of Constructing a Motion Control System for a Remotely Operated Sea Vessel in the Port Area Based on the NMEA-2000 Network Protocol

I. A. Sikarev and A. V. Garanin p. 932  abstract

Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems

E. A. Zaitseva, D. P. Zegzhda and M. A. Poltavtseva p. 937  abstract

An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things

A. D. Dakhnovich, D. A. Moskvin and D. P. Zegzhda p. 948  abstract

Benford’s Law in the Detection of DoS Attacks on Industrial Systems

E. B. Aleksandrova, D. S. Lavrova and A. V. Yarmak p. 954  abstract

Detection of Security Threats to Modern Websites

D. V. Ivanov, D. A. Moskvin and G. S. Kubrin p. 963  abstract

Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users

E. B. Aleksandrova, E. N. Shkorkina and M. O. Kalinin p. 969  abstract

Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series

D. P. Zegzhda, M. O. Kalinin and M. V. Levykin p. 972  abstract

Spoofing Attack on Eigenfaces-Based Biometric Identification System

G. B. Marshalko and L. O. Nikiforova p. 980  abstract

Model for Identifying Cyber Threats to Internet Information Resources

I. V. Luskatov and S. V. Pilkevich p. 987  abstract

Face Recognition Based on the Coefficient Tree for Three Scale Wavelet Transformation

Wang Lyanpen, O. G. Petrosyan and Du Jianming p. 995  abstract

Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks

V. M. Krundyshev p. 1006  abstract

Preparing Datasets for Training in a Neural Network System of Intrusion Detection in Industrial Systems

V. M. Krundyshev p. 1012  abstract

Model of Cyberattacks on Digital Production Systems

E. Yu. Pavlenko p. 1017  abstract

Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model

E. Yu. Pavlenko p. 1020  abstract

Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks

D. S. Lavrova p. 1023  abstract

Maintaining Cyber Sustainability in Industrial Systems Based on the Concept of Molecular-Genetic Control Systems

D. S. Lavrova p. 1026  abstract

Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions

E. V. Doynikova, A. V. Fedorchenko and I. V. Kotenko p. 1029  abstract

Model and Method for Optimizing Computational Processes in Parallel Computing Systems

V. G. Anisimov, P. D. Zegzhda, E. G. Anisimov, T. N. Saurenko and V. V. Kasatkin p. 1038  abstract

Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls

R. A. Ognev, E. V. Zhukovskii and D. P. Zegzhda p. 1045  abstract

Cloud-Based Data Architecture Security

N. A. Semenov and A. A. Poltavtsev p. 1056  abstract

Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters

D. S. Lavrova, E. A. Popova and A. A. Shtyrkina p. 1065  abstract