Contents

Automatic Control and Computer Sciences


Vol. 57, No. 8, 2023


Assessment of the Effectiveness of an Information Security System

D. P. Zegzhda, T. N. Saurenko, V. G. Anisimov and E. G. Anisimov p. 855  abstract

Resistance of a Two-Component Steganographic System to Unauthorized Information Extraction

M. V. Shakurskii, O. A. Karaulova and E. S. Kartashevskaya p. 862  abstract

Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering

A. D. Dakhnovich, D. S. Zagalsky and R. S. Solovey p. 868  abstract

Current Trends in Methods of the Efficient Automation of Data Processing

I. A. Sikarev, T. V. Vekshina, V. A. Bol’shakov and E. M. Korinets p. 875  abstract

Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems

D. P. Zegzhda, A. F. Suprun, V. G. Anisimov, A. V. Tebekin and E. G. Anisimov p. 881  abstract

Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography

N. N. Shenets p. 886  abstract

Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures

D. A. Moskvin p. 894  abstract

Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols

S. O. Kostin and E. B. Aleksandrova p. 904  abstract

Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet

P. V. Semyanov and S. V. Grezina p. 914  abstract

Finding Enumerators for Generalized (L, G)-Code

I. K. Noskov and S. V. Bezzateev p. 922  abstract

Decimation of M Sequences As a Way of Obtaining Primitive Polynomials

D. V. Kushnir and S. N. Shemyakin p. 928  abstract

Empirical Study of the Stability of a Linear Filter Based on the Neyman–Pearson Criterion to Changes in the Average Values

R. A. Ognev and D. P. Zegzhda p. 933  abstract

Risk Assessment of Using Open Source Projects: Analysis of the Existing Approaches

M. A. Eremeev and I. I. Zakharchuk p. 938  abstract

Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code

G. S. Kubrin and D. P. Zegzhda p. 947  abstract

Analysis of Decompiled Program Code Using Abstract Syntax Trees

N. A. Gribkov, T. D. Ovasapyan and D. A. Moskvin p. 958  abstract

Features of Detecting Malicious Installation Files Using Machine Learning Algorithms

P. E. Yugai, E. V. Zhukovskii and P. O. Semenov p. 968  abstract

Confidentiality of Machine Learning Models

M. A. Poltavtseva and E. A. Rudnitskaya p. 975  abstract

Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems

M. O. Kalinin, A. F. Suprun and O. D. Ivanova p. 983  abstract

Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder

V. V. Platonov and N. M. Grigorjeva p. 989  abstract

Protection of Computational Machine Learning Models against Extraction Threat

M. O. Kalinin, M. D. Soshnev and A. S. Konoplev p. 996  abstract

Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods

S. V. Bezzateev, S. G. Fomicheva and A. F. Suprun p. 1005  abstract

Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic

G. A. Markov p. 1018  abstract

A Decentralized Approach to Intrusion Detection in Dynamic Networks of the Internet of Things Based on Multiagent Reinforcement Learning with Interagent Interaction

M. O. Kalinin and E. I. Tkacheva p. 1025  abstract

Stability Analysis of the Architecture of Messaging Systems with a Decentralized Node Structure

E. M. Orel, D. A. Moskvin and I. A. Anoshkin p. 1033  abstract

Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory

V. M. Krundyshev, G. A. Markov, M. O. Kalinin, P. V. Semyanov and A. G. Busygin p. 1040  abstract

Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks

D. S. Lavrova and O. A. Izotova p. 1047  abstract

Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology

E. Yu. Pavlenko and M. A. Pakhomov p. 1055  abstract

Framework for Modeling Security Policies of Big Data Processing Systems

M. A. Poltavtseva, D. V. Ivanov and E. V. Zavadskii p. 1063  abstract

Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation

M. E. Sukhoparov and I. S. Lebedev p. 1071  abstract

Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks

E. B. Aleksandrova and A. A. Shtyrkina p. 1076  abstract

Analysis and Forecasting of States of Industrial Networks with Adaptive Topology Based on Network Motifs

E. Yu. Pavlenko p. 1084  abstract

Data Modeling in Big Data Systems Including Polystore and Heterogeneous Information Processing Components

M. A. Poltavtseva p. 1096  abstract

Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity

D. S. Lavrova, V. M. Bogina, D. P. Zegzhda and E. Yu. Pavlenko p. 1103  abstract

A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity

A. D. Shilova and A. A. Vorob’eva p. 1116  abstract

Application of Machine Learning Methods to the Problem of Searching for a Region of Interest for Biometric Identification Based on the Pattern of Palm Veins

A. I. Almuhamedov and V. S. Kolomoitcev p. 1126  abstract