Contents

Automatic Control and Computer Sciences


Vol. 54, No. 8, 2020


Hierarchical Scheme for Secret Separation Based on Computable Access Labels

S. V. Belim and N. F. Bogachenko p. 773  abstract

Probability of a Checksum Error in a Message with Possible Distortion

A. P. Baranov and P. A. Baranov p. 779  abstract

Ensuring Cybersecurity of Digital Production Using Modern Neural Network Methods

V. M. Krundyshev p. 786  abstract

Ensuring Cyber Resilience of Large-Scale Network Infrastructure Using the Ant Algorithm

E. Yu. Pavlenko and K. V. Kudinov p. 793  abstract

Isogeny-Based Cryptographic Access Control

E. B. Aleksandrova, A. A. Shtyrkina and A. V. Yarmak p. 803  abstract

Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly Problem

E. A. Zaitseva and D. S. Lavrova p. 813  abstract

Countering Cyberattacks against Intelligent Bioinspired Systems Based on FANET

E. Yu. Pavlenko and M. D. Stepanov p. 822  abstract

Inference Attacks and Information Security in Databases

A. A. Poltavtsev, A. R. Khabarov and A. O. Selyankin p. 829  abstract

Application of Taint Analysis to Study the Safety of Software of the Internet of Things Devices Based on the ARM Architecture

T. D. Ovasapyan, P. V. Knyazev and D. A. Moskvin p. 834  abstract

A Technique for Safely Transforming the Infrastructure of Industrial Control Systems to the Industrial Internet of Things

A. D. Dakhnovich, D. A. Moskvin and D. V. Ivanov p. 841  abstract

Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven Distribution of Computational Power

A. G. Busygin and A. S. Konoplev p. 850  abstract

A Procedure for Improving Information System Audit Quality by Enhancing Cyberthreat Simulation in Practice

M. A. Eremeev and I. I. Zakharchuk p. 854  abstract

A General Scheme for the Pre-Distribution of Keys

S. V. Belim and S. Yu. Belim p. 860  abstract

Approach to the Evaluation of the Efficiency of Information Security in Control Systems

P. D. Zegzhda, V. G. Anisimov, P. V. Sem’yanov, A. F. Suprun, E. G. Anisimov, T. N. Saurenko and V. P. Los’ p. 864  abstract

Detection of Network Attacks Using the Tsetlin Machine

D. S. Lavrova and N. N. Eliseev p. 871  abstract

An Approach to Assessing Information Security Effectiveness in Control Systems

V. I. Korzhik, D. C. Nguyen and K. A. Akhrameeva p. 879  abstract

Lattice-Based Ring Signature with Linking-Based Revocation for Industrial Internet of Things

E. B. Aleksandrova, I. Sh. Rekhviashvili and A. V. Yarmak p. 888  abstract

On Improving the Reliability and Information Security of Information Transmission Systems in Communication Channels of an Unmanned Vessel

I. A. Sikarev, V. V. Sakharov and A. V. Garanin p. 896  abstract

Identification of Cyber Threats in Networks of Industrial Internet of Things Based on Neural Network Methods Using Memory

V. M. Krundyshev p. 900  abstract

Reduction of the Number of Analyzed Parameters in Network Attack Detection Systems

E. A. Popova and V. V. Platonov p. 907  abstract

Analysis of Safety Methods for a New Generation of Automobiles

K. V. Vasil’eva, E. Yu. Pavlenko and P. V. Sem’yanov p. 915  abstract

Specification-Based Classification of Network Protocol Vulnerabilities

I. V. Alekseev and P. D. Zegzhda p. 922  abstract

A Model of Optimal Complexification of Measures Providing Information Security

P. D. Zegzhda, V. G. Anisimov, A. F. Suprun, E. G. Anisimov, T. N. Saurenko and V. P. Los’ p. 930  abstract

Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach

D. S. Lavrova and R. S. Solovei p. 937  abstract

Multilevel Model of Computer Attack Based on Attributive Metagraphs

I. T. Latypov and M. A. Eremeev p. 944  abstract

Securing Post-Quantum Resistance for Quantum-Protected Communication Systems

E. N. Shkorkina and E. B. Aleksandrova p. 949  abstract

Detection of Distributed Denial of Service Attacks in Large-Scale Networks Based on Methods of Mathematical Statistics and Artificial Intelligence

I. V. Alekseev p. 952  abstract

Optimal Identification for Objects in Problems on Recognition by Unmanned Underwater Vehicles

A. P. Nyrkov, S. S. Sokolov, O. M. Alimov, S. G. Chernyi and V. A. Dorovskoi p. 958  abstract

Algorithms for Enhancing Information Security in the Processing of Navigation Data of Unmanned Vessels of the Technical Fleet of the Inland Waterways of the Russian Federation

I. A. Sikarev, G. B. Chistyakov, A. V. Garanin and D. A. Moskvin p. 964  abstract

Building an Adaptive System for Collecting and Preparing Data for Security Monitoring

M. A. Poltavtseva and D. P. Zegzhda p. 968  abstract

The Analysis of Artificial Neural Network Structure Recovery Possibilities Based on the Theory of Graphs

D. S. Lavrova and A. A. Shtyrkina p. 977  abstract

A Survey of Mathematical Methods for Security Analysis of Cyberphysical Systems

A. D. Fatin, E. Yu. Pavlenko and M. A. Poltavtseva p. 983  abstract

Localizing Failures with Metadata

N. A. Grusho, A. A. Grusho and E. E. Timonina p. 988  abstract

Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm

M. O. Kalinin, V. M. Krundyshev and B. G. Sinyapkin p. 993  abstract

Identification of Anomalies in the Operation of Telecommunication Devices Based on Local Signal Spectra

M. E. Sukhoparov, V. V. Semenov, K. I. Salakhutdinova and I. S. Lebedev p. 1001  abstract

Access Differentiation in Object-Oriented Databases Based on the Extended Object-Oriented Harrison–Ruzzo–Ullman Model

M. L. Glukharev and M. F. Solomatova p. 1007  abstract