Contents

Automatic Control and Computer Sciences


Vol. 56, No. 8, 2022


Methods of Multidimensional Aggregation of Time Series of Streaming Data for Cyber-Physical System Monitoring

M. A. Poltavtseva and T. M. Andreeva p. 829  abstract

Botnet Attack Detection Approach in IoT Networks

T. M. Tatarnikova, I. A. Sikarev, P. Yu. Bogdanov and T. V. Timochkina p. 838  abstract

Trust Evaluation Problems in Big Data Analytics

A. A. Grusho, N. A. Grusho, M. I. Zabezhailo and E. E. Timonina p. 847  abstract

Detecting Malicious Executable Files Based on Static–Dynamic Analysis Using Machine Learning

R. A. Ognev, E. V. Zhukovskii, D. P. Zegzhda and A. N. Kiselev p. 852  abstract

Bank Fraud Detection with Graph Neural Networks

A. I. Sergadeeva, D. S. Lavrova and D. P. Zegzhda p. 865  abstract

Applying Distributed Ledger Technology to Auditing and Incident Investigation in Big Data Processing Systems

M. A. Poltavtseva and V. A. Torgov p. 874  abstract

Performance Evaluation of Antivirus Systems for Computer Networks

V. G. Anisimov, E. G. Anisimov, T. N. Saurenko and V. P. Los’ p. 883  abstract

Reactive and Proactive Methods for Database Protection against Logical Inference Attacks

A. A. Poltavtsev p. 888  abstract

Immunization of Complex Networks: Topology and Methods

A. D. Fatin and E. Yu. Pavlenko p. 898  abstract

Systematization of Cyber Threats to Large-Scale Systems with Adaptive Network Topology

E. Yu. Pavlenko p. 906  abstract

Generation of Synthetic Data for Honeypot Systems Using Deep Learning Methods

V. D. Danilov, T. D. Ovasapyan, D. V. Ivanov, A. S. Konoplev and D. A. Moskvin p. 916  abstract

Mathematical Model of the Spread of Computer Attacks on Critical Information Infrastructure

V. M. Krundyshev and M. O. Kalinin p. 927  abstract

Adversarial Machine Learning Protection Using the Example of Evasion Attacks on Medical Images

E. A. Rudnitskaya and M. A. Poltavtseva p. 934  abstract

Immunization of Complex Networks: System of Differential Equations and Dynamic Variation

E. Yu. Pavlenko and A. D. Fatin p. 942  abstract

Authentication and Key Establishment in WSN Based on Key Predistribution

N. N. Shenets p. 947  abstract

Computer Network Clustering Methods in Cybersecurity Problems

E. Yu. Pavlenko, I. S. Eremenko and A. D. Fatin p. 957  abstract

Counteracting Information Threats Using Honeypot Systems Based on a Graph of Potential Attacks

E. V. Zavadskii and D. V. Ivanov p. 964  abstract

Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture

V. N. Ruchkin, B. V. Kostrov and V. A. Fulin p. 970  abstract

Using Information about Influencing Factors to Split Data Samples in Machine Learning Methods for the Purposes of Assessing Information Security

I. S. Lebedev and M. E. Sukhoparov p. 981  abstract

Two-Component Steganographic System for Embedding Information into Least Significant Bits of Audio Signals

M. V. Shakurskiy p. 988  abstract

Review and Comparison of Lightweight Modifications of the AES Cipher for a Network of Low-Power Devices

O. I. Berezovskaya, S. S. Chuprov, E. A. Neverov and E. R. Sadreev p. 994  abstract

Noise-Resistant Coding and Highly Undetectable Stegosystems – Is the Alliance Successful?

V. N. Kustov and A. G. Krasnov p. 1007  abstract

Functional Model of Adaptive Network Topology of Large-Scale Systems Based on Dynamical Graph Theory

E. Yu. Pavlenko p. 1016  abstract

Blockchain Technology in 5G Networks: Performance Comparison of Private and Public Blockchains

I. R. Fedorov, A. V. Pimenov, G. A. Panin and S. V. Bezzateev p. 1025  abstract

Noise-Immune Marking of Digital Audio Signals in Audio Stegosystems with Multiple Inputs and Multiple Outputs

M. V. Gofman p. 1030  abstract

Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure

V. M. Krundyshev and M. O. Kalinin p. 1040  abstract