Vol. 54, No. 8, 2020
Hierarchical Scheme for Secret Separation Based on Computable Access Labels
p. 773 abstract
Probability of a Checksum Error in a Message with Possible Distortion
p. 779 abstract
Ensuring Cybersecurity of Digital Production Using Modern Neural Network Methods
p. 786 abstract
Ensuring Cyber Resilience of Large-Scale Network Infrastructure Using the Ant Algorithm
p. 793 abstract
Isogeny-Based Cryptographic Access Control
p. 803 abstract
Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly Problem
p. 813 abstract
Countering Cyberattacks against Intelligent Bioinspired Systems Based on FANET
p. 822 abstract
Inference Attacks and Information Security in Databases
p. 829 abstract
Application of Taint Analysis to Study the Safety of Software of the Internet of Things Devices Based on the ARM Architecture
p. 834 abstract
A Technique for Safely Transforming the Infrastructure of Industrial Control Systems to the Industrial Internet of Things
p. 841 abstract
Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven Distribution of Computational Power
p. 850 abstract
A Procedure for Improving Information System Audit Quality by Enhancing Cyberthreat Simulation in Practice
p. 854 abstract
A General Scheme for the Pre-Distribution of Keys
p. 860 abstract
Approach to the Evaluation of the Efficiency of Information Security in Control Systems
p. 864 abstract
Detection of Network Attacks Using the Tsetlin Machine
p. 871 abstract
An Approach to Assessing Information Security Effectiveness in Control Systems
p. 879 abstract
Lattice-Based Ring Signature with Linking-Based Revocation for Industrial Internet of Things
p. 888 abstract
On Improving the Reliability and Information Security of Information Transmission Systems in Communication Channels of an Unmanned Vessel
p. 896 abstract
Identification of Cyber Threats in Networks of Industrial Internet of Things Based on Neural Network Methods Using Memory
p. 900 abstract
Reduction of the Number of Analyzed Parameters in Network Attack Detection Systems
p. 907 abstract
Analysis of Safety Methods for a New Generation of Automobiles
p. 915 abstract
Specification-Based Classification of Network Protocol Vulnerabilities
p. 922 abstract
A Model of Optimal Complexification of Measures Providing Information Security
p. 930 abstract
Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach
p. 937 abstract
Multilevel Model of Computer Attack Based on Attributive Metagraphs
p. 944 abstract
Securing Post-Quantum Resistance for Quantum-Protected Communication Systems
p. 949 abstract
Detection of Distributed Denial of Service Attacks in Large-Scale Networks Based on Methods of Mathematical Statistics and Artificial Intelligence
p. 952 abstract
Optimal Identification for Objects in Problems on Recognition by Unmanned Underwater Vehicles
p. 958 abstract
Algorithms for Enhancing Information Security in the Processing of Navigation Data of Unmanned Vessels of the Technical Fleet of the Inland Waterways of the Russian Federation
p. 964 abstract
Building an Adaptive System for Collecting and Preparing Data for Security Monitoring
p. 968 abstract
The Analysis of Artificial Neural Network Structure Recovery Possibilities Based on the Theory of Graphs
p. 977 abstract
A Survey of Mathematical Methods for Security Analysis of Cyberphysical Systems
p. 983 abstract
Localizing Failures with Metadata
p. 988 abstract
Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm
p. 993 abstract
Identification of Anomalies in the Operation of Telecommunication Devices Based on Local Signal Spectra
p. 1001 abstract
Access Differentiation in Object-Oriented Databases Based on the Extended Object-Oriented Harrison–Ruzzo–Ullman Model
p. 1007 abstract