Contents

Automatic Control and Computer Sciences


Vol. 58, No. 8, 2024


Justification of the Rational Composition of the Information Security System

A. F. Suprun, D. P. Zegzhda, V. G. Anisimov, and E. D. Anisimov p. 1093  abstract

Construction of Deterministic and Stochastic Mathematical Models of Information System Protection

O. V. Rybkina p. 1100  abstract

Model for Ranking the System of Indicators of Node Compromise of Corporate Data Network Nodes

S. V. Bezzateev, V. A. Mylnikov, and A. R. Starodub p. 1108  abstract

The Concept of Secure Distributed Ledger Technology in the Digital Environment of a Smart City

M. O. Kalinin, and A. S. Konoplev p. 1114  abstract

Intelligent Synthesis of Cyber-Resilient Network Structures: Methods, Experiments, and Architecture Implementation

E. Yu. Pavlenko p. 1119  abstract

Mathematical Model of Information Security Event Management Using a Markov Chain in Industrial Systems

V. M. Krundyshev, G. A. Markov, and I. Yu. Zhukov p. 1132  abstract

Threat Model for Decentralized Messaging Systems

E. M. Orel, I. A. Anoshkin, and D. A. Moskvin p. 1139  abstract

Detecting Malware Using Deep Neural Networks

T. D. Ovasapyan, M. A. Volkovskii, and A. S. Makarov p. 1147  abstract

Cluster Analysis of a Collective of Algorithms of Multicore Neural Network Automata and Robots on Chip

V. N. Ruchkin, V. A. Fulin, E. V. Ruchkina, and D. V. Grigorenko p. 1156  abstract

Steganalytical Module for Detecting Embeddings in Images with a Low Stego Container Filling

D. E. Vil’khovskii p. 1164  abstract

Peculiarities of Solving the Problem of Controlling Information Security Risks in the Development of Protection Methods against Covert (Steganographic) Information Exchange in Public Internet Resources

M. Yu. Fedosenko p. 1169  abstract

Intelligent Mechanisms for Extracting Signs of File Modification in Dynamic Virus Analysis

S. G. Fomicheva, and O. D. Gayduk p. 1180  abstract

Segmenting Input Data to Improve the Quality of Identification of Information Security Events

M. E. Sukhoparov, I. S. Lebedev, and D. D. Tikhonov p. 1192  abstract

Analysis of the Reliability of Template Storage When Implementing Modern Biometric Technologies in Information Security Systems

L. Kh. Safiullina, A. R. Kasimova, and A. A. Alekseeva p. 1204  abstract

Detecting Synthesized Audio Files Using Graph Neural Networks

O. A. Izotova, and D. S. Lavrova p. 1212  abstract

Detecting Attacks Using Artificial Neural Networks

I. A. Sikarev, and T. M. Tatarnikova p. 1218  abstract

Using Machine Learning Algorithms and Honeypot Systems to Detect Adversarial Attacks on Intrusion Detection Systems

P. E. Yugai, and D. A. Moskvin p. 1226  abstract

Protecting Machine Learning Models from Training Data Set Extraction

M. O. Kalinin, A. A. Muryleva, and V. V. Platonov p. 1234  abstract

Application of Indicator Functions in Models of Detection and Neutralization of Harmful Information Objects

A. F. Suprun, A. Yu. Garkushev, A. V. Vyvolokina, and S. I. Fokina p. 1242  abstract

Formal Statement of the Problem of Morphing Executive Code in Software Operation

N. V. Gololobov p. 1250  abstract

Detecting Defects in Multicomponent Software Using a Set of Universal Graph Representations of the Code

G. S. Kubrin, and D. P. Zegzhda p. 1255  abstract

Method of Searching for Clones of the Program Code in Binary Executive Files

E. V. Zavadskii, A. V. Bulat, and N. A. Gribkov p. 1263  abstract

Identification and Verification of Authorship Using Machine and Deep Learning Methods

T. D. Ovasapyan, E. M. Tolgorenko, and E. A. Zubkov p. 1271  abstract

The Use of Generative-Adversarial Networks to Counter Steganalysis

E. B. Aleksandrova, A. I. Bezborodko, and D. S. Lavrova p. 1283  abstract

Model of a Distributed Storage System for Crypto Wallet Private Keys

M. R. Salikhov p. 1289  abstract

On the Method of Masking in the Multiple Signature Protocol Based on Isogenies of Elliptic Curves

E. B. Aleksandrova, and S. O. Kostin p. 1297  abstract

Probability-Theoretical Models of Physical Random Number Generators

D. S. Bogdanov, A. S. Logachev, and V. O. Mironkin p. 1303  abstract

Verification of Access Control in Big Data Systems Using Temporal Logics

M. A. Poltavtseva, A. A. Podorov, and E. B. Aleksandrova p. 1311  abstract

Providing Information Security of Vehicular Ad Hoc Networks Using the Early Detection of Malicious Nodes

E. Yu. Pavlenko, and M. A. Pakhomov p. 1318  abstract

Protection Against Unauthorized Access of Mobile Devices When Using the BYOD Concept

A. A. Kornienko, S. V. Kornienko, and N. S. Razzhivin p. 1326  abstract

Application of Distributed Ledger Technology to Ensure the Security of Smart City Information Systems

M. O. Kalinin, A. G. Busygin, A. S. Konoplev, and V. M. Krundyshev p. 1336  abstract

Protection of Ad Hoc Networks against Distributed Network Scanning

M. A. Pakhomov p. 1343  abstract

Assessing the Security of Big Data Systems

M. A. Poltavtseva, V. V. Zaitseva, and D. V. Ivanov p. 1352  abstract

Analysis of Data Exchange Systems about Information Security Threats

E. Yu. Pavlenko, and N. V. Polosukhin p. 1365  abstract

Researching the Performance of AutoML Platforms in Confidential Computing

S. V. Bezzateev, G. A. Zhemelev, and S. G. Fomicheva p. 1373  abstract

Intelligent Recommendation System for Countering Network Attacks

I. A. Goretskii, and D. S. Lavrova p. 1386  abstract

Method of Embedding Hidden Data into a Message Stream with Noise-Immune Encoding

S. V. Belim, and S. A. Gorshkov p. 1392  abstract

Development of Software and Hardware to Protect Technological Processes from Cyber Threats

F. G. Pashaev, D. I. Zeinalov, and G. T. Nadzhafov p. 1396  abstract

Analysis of the Problems of Using Steganographic Methods in Implementing Illegal Actions and Their Role in Digital Forensics

S. V. Bezzateev, and M. Yu. Fedosenko p. 1406  abstract

Development of a Method for Ensuring Data Integrity in Edge Computing Networks Based on Blockchain Technology

I. R. Fedorov, and A. A. Kovalev p. 1422  abstract

Assessment of the Competence of an Intelligent Information Security Management System

A. F. Suprun, A. Yu. Gar’kushev, A. V. Lipis, I. L. Karpova, and A. A. Shalkovskaya p. 1429  abstract

Attack Graph-Based Data Presentation for Use in Automated Security Analysis Systems

E. M. Orel, D. A. Moskvin, and A. A. Lyashenko p. 1436  abstract

Graph of Self-Regulation of Various Types of Networks with Adaptive Topology

E. Yu. Pavlenko, and M. A. Pakhomov p. 1442  abstract