Contents

Automatic Control and Computer Sciences


Vol. 55, No. 8, 2021


Information Security Incident Forecasting

T. N. Saurenko, V. G. Anisimov, E. G. Anisimov, V. V. Kasatkin and V. P. Los’ p. 903  abstract

Application of Neuro-Fuzzy Inference to Detect Network Scanning

M. O. Kalinin p. 908  abstract

Comparison of Four Methods of Checking the Integrity of Transmitted Message Blocks

P. A. Baranov p. 918  abstract

Architecture and Operation Algorithm of a Biometric Voice Authentication System

E. P. Belova and I. V. Mashkina p. 924  abstract

Automated Search for Vulnerabilities in ARM Software Using Dynamic Symbolic Execution

T. D. Ovasapyan, P. V. Knyazev and D. A. Moskvin p. 932  abstract

Using Artificial Neural Networks to Estimate the Probability of Information Security Threat Occurrences

R. A. Antonov, E. V. Karachanskaya and G. V. Khandozhko p. 941  abstract

Constructing the Model of an Information System for the Automatization of Penetration Testing

A. V. Myasnikov, A. S. Konoplev, A. F. Suprun, V. G. Anisimov, V. V. Kasatkin and V. P. Los’ p. 949  abstract

Requirements on Providing a Sustainability of Industrial Internet of Things

A. D. Dakhnovich, D. A. Moskvin and D. P. Zegzhda p. 956  abstract

The Use of Beacon Signals to Detect Covert Channels in DNS Traffic

M. A. Eremeev, V. S. Nefedov, A. S. Ostrovskii and D. A. Semchenkov p. 962  abstract

Methodology of Mediametric Information Analysis with the Use of Machine Learning Algorithms

I. E. Gorbachev, A. A. Kriulin and I. T. Latypov p. 970  abstract

Localization of the Root Cause of the Anomaly

A. A. Grusho, N. A. Grusho, M. I. Zabezhailo and E. E. Timonina p. 978  abstract

Comparative Analysis of Methods for Protection against Logical Inference

A. A. Poltavtsev, A. R. Khabarov and A. O. Selyankin p. 984  abstract

Application of Synthetic Data Generation Methods to the Detection of Network Attacks on Internet of Things Devices

T. D. Ovasapyan, V. D. Danilov and D. A. Moskvin p. 991  abstract

Organization of Environmental Monitoring of the Port Water Area by Processing an Anti-Interference Signal from a Vessel Traffic Control System

V. A. Miklush, I. A. Sikarev and T. M. Tatarnikova p. 999  abstract

A Method for Watermark Detection in Digital Audio Signals by Authorized Users

M. V. Gofman, A. A. Kornienko and M. L. Glukharev p. 1005  abstract

Operational Efficiency of Computer Networks under Conditions of Malicious Cyber Activity

P. D. Zegzhda, V. G. Anisimov, E. G. Anisimov, T. N. Saurenko and V. P. Los’ p. 1020  abstract

Protection against Adversarial Attacks on Malware Detectors Using Machine Learning Algorithms

I. I. Marshev, E. V. Zhukovskii and E. B. Aleksandrova p. 1025  abstract

New Regular Sliding Window Algorithms for Elliptic Curve Scalar Point Multiplication

N. N. Shenets and A. S. Petushkov p. 1029  abstract

Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm

M. D. Stepanov, E. Yu. Pavlenko and D. S. Lavrova p. 1039  abstract

Detecting Anomalies in Cyber-Physical Systems Using Graph Neural Networks

K. V. Vasil’eva and D. S. Lavrova p. 1051  abstract

Using Security-through-Obscurity Principle in an Industrial Internet of Things

A. D. Dakhnovich, D. A. Moskvin and D. P. Zegzhda p. 1061  abstract

Algorithm for Online Detection of Traffic Anomalies in High-Speed Enterprise Multiservice Communication Networks

S. A. Ageev, N. S. Ageeva, V. V. Karetnikov, A. A. Privalov and I. A. Sikarev p. 1068  abstract

Adversarial Attacks on Intrusion Detection Systems Using the LSTM Classifier

D. A. Kulikov and V. V. Platonov p. 1080  abstract

Authentication of Control Devices in the Internet of Things with the Architecture of Edge Computing

E. B. Aleksandrova, A. Yu. Oblogina and E. N. Shkorkina p. 1087  abstract

Detection of Malicious Executable Files Based on Clustering of Activities

R. A. Ognev, E. V. Zhukovskii and D. P. Zegzhda p. 1092  abstract

Approach to Recognition of Malicious Behavior Based on Autoregression Model upon Investigation into Cyberincident

S. I. Smirnov, M. A. Eremeev and I. A. Pribylov p. 1099  abstract

Applying Honeypot Technology with Adaptive Behavior to Internet-of-Things Networks

T. D. Ovasapyan, V. A. Nikulkin and D. A. Moskvin p. 1104  abstract

Using the Neat-Hypercube Mechanism to Detect Cyber Attacks on IoT Systems

A. D. Fatin and E. Yu. Pavlenko p. 1111  abstract

Use of Contradictions in Data for Finding Implicit Failures in Computer Systems

A. A. Grusho, N. A. Grusho, M. I. Zabezhailo and E. E. Timonina p. 1115  abstract

An Encrypted File Detection Algorithm

A. V. Kozachok, V. I. Kozachok and A. A. Spirin p. 1121  abstract

Discrete Chaotic Transformations of Hidden Messages to Disguise Them as Noise in Steganography Problems

V. N. Kustov and A. G. Krasnov p. 1129  abstract

Application of Ensembles of Neural Networks Trained on Unbalanced Samples for Analyzing Statuses of IoT Devices

M. E. Sukhoparov and I. S. Lebedev p. 1136  abstract

Improvement of Information Security of Monitoring Channels in Meteor-Burst Communication Networks of the Russian Arctic

V. I. Doroshenko, A. N. Pivovarov and Yu. G. Ksenofontov p. 1142  abstract

Theoretical Approach for Evaluating the Connectivity of Distributed Systems and Telecommunications for the Digital Economy

E. N. Chizhikov, A. A. Gorbunov, A. S. Belov, E. L. Trakhinin and D. V. Stavitskii p. 1149  abstract

A Two-Component Steganographic System Based on the Sum of Linear Functions of Two Signals Using a Multiplicative Form of Constraint of Embedded Signals

M. V. Shakurskiy p. 1153  abstract

Basic Principles of Creating Control Algorithms for a Remotely Piloted Sea Vessel to Improve the Information Security of Noisy Data Transmission Channels

I. A. Sikarev and A. V. Garanin p. 1159  abstract

Analysis of a Huge Amount of Network Traffic Based on Quantum Machine Learning

M. O. Kalinin and V. M. Krundyshev p. 1165  abstract

Software Identification by Standard Machine Learning Tools

M. E. Sukhoparov, K. I. Salakhutdinova and I. S. Lebedev p. 1175  abstract

On Cryptographic Properties of the NB-Fi Protocol

E. K. Alekseev, L. R. Akhmetzyanova, V. D. Nikolaev, S. V. Smyshlyaev and A. I. Bondarenko p. 1180  abstract

An Integrity Control Model for Multidimensional Data Arrays

S. A. Dichenko p. 1188  abstract

Implementation of Honeypot Systems Based on the Potential Attack Graph

E. V. Zavadskii and D. V. Ivanov p. 1194  abstract

Formation of Data Structures in the Problems of Active Security Monitoring

M. A. Poltavtseva p. 1201  abstract

Approach to Recognition of Malicious Servers of TOR Anonymization Network Based on Cluster Analysis

V. S. Nefedov, A. A. Kriulin and M. A. Eremeev p. 1209  abstract

Fake Post Detection Using Graph Neural Networks

O. A. Izotova and D. S. Lavrova p. 1215  abstract

Conceptual Model for Adaptive Control of a Geographic Information System under Conditions of Destabilization

V. V. Gryzunov p. 1222  abstract