• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Of all publications in the section: 6
Sort:
by name
by year
Article
Лещёв Д. А., Сучков Д. В., Хайкова С. П. и др. Вопросы кибербезопасности. 2019. Т. 32. № 4. С. 61-71.

The purpose of the study: development of methods for analyzing the graph of interacting objects based on the detection of implicit communities in order to solve the problems of searching for the proximity of profiles and the exchange, distribution of information between objects.

Method: importing data from social networks with the subsequent construction of a weighted graph based on the selected attributes and the weight function corresponding to the original task; detection of communities on the constructed weighted graph and comparison of the obtained partitions with the results of classical algorithms.

Results: algorithms to construct graphs and to import attributes were developed and implemented, weight functions created, data structures were constructed, Louvain algorithm for weighted graphs was investigated and implemented with the according to data structures, additional hyper parameters that improve the quality of the standard graph partition by implicit user communities were added. On the example of the social network VKontakte, special algorithms for database crawling are built, the software and hardware complex is applied on real data, and the results of work are compared with the classical algorithms for allocating communities.

Added: Aug 2, 2019
Article
Чеповский А. М., Лаврентьев А. М., Смирнов И. В. и др. Вопросы кибербезопасности. 2019. № 4(32). С. 54-60.
Added: Aug 10, 2019
Article
Соколова Т. В., Чеповский А. М. Вопросы кибербезопасности. 2019. № 4(32). С. 88-93.
Added: Aug 10, 2019
Article
Аветисян А. И., Белеванцев А. А., Чукляев И. И. Вопросы кибербезопасности. 2014. № 3. С. 20-28.

Results of the analysis of the existing approaches to protection and identification of defects (vulnerabilities and errors) in the source and binary code of software, provided on the different stages of development and maintenance. The most common defects (vulnerabilities and errors) and objects of destructive programming attacks are generalized, functional and ergonomic requirements to the modern analysis software are presented.

Added: Mar 22, 2017
Article
Зыков С. В. Вопросы кибербезопасности. 2015. № 4(12). С. 48-52.

The paper presents major concepts of the new technology for large-scale data integration. The current enterprise data size is large, and it grows exponentially. The data management issue is even more challenging due to the heterogeneous character of the data. The technology developed encompasses a set of new object-based models, methods and software tools for representing and manipulating heterogeneous data.

Added: Feb 12, 2016
Article
Левашов М. В., Овчинников П. В. Вопросы кибербезопасности. 2019. № 5. С. 63-69.
Added: Aug 2, 2019