?
The Use of Hardware Virtualization in the Context of Information Security
Programming and Computer Software. 2012. Vol. 38. No. 5. P. 276–280.
The use of hardware virtualization for ensuring information security is discussed. A review of various approaches to improving the security of software systems based on virtualization is given. A review of possible scenarios of using virtualization by intruders is also presented. The application domains and limitations of the available solutions and perspectives of future development in the field are discussed.
Research target:
Computer Science
Language:
English
Dayoub A., Suleiman E., IEEE, 2026.
2026 8th International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE)
1-3 April 2026 ...
Added: April 30, 2026
М.: ООО «Геомодель Развитие», 2024.
Интелшектуальный анализ данных в нефтегазовой отрасли, Калининград, Россия, 2024, ООО «Геомодель Развитие» ...
Added: April 29, 2026
Karpova Irina Petrovna, Pattern Recognition and Image Analysis 2025 Vol. 35 No. 4 P. 1138–1144
A solution to the problem of redistributing agents between groups based on simulating a form of social parasitism in ants known as slave-making is considered. To provide a comprehensive solution, the problem is integrated with a method of orientation based on visual landmarks and a compass, including route memorization and return. The models and mechanisms ...
Added: April 29, 2026
Derkacheva A., Sakirkina M., Kraev G. et al., /. 2026.
Comprehensive data on natural hazards and their consequences are crucial for effective for risk assessment, adaptation planning, and emergency response. However, many countries face challenges with fragmented, inconsistent, and inaccessible data, particularly regarding local-scale events. To address this data gap in Russia, we developed an end-to-end processing pipeline that scrapes news from various online sources, ...
Added: April 28, 2026
Domrin V. I., Malova H. V., V. Yu. Popov et al., Cosmic Research 2026 Vol. 64 No. 2 P. 238–252
During magnetospheric perturbations a relatively thin current sheet with thickness about several
proton gyroradii forms in the Earth’s magnetotail. In a framework of the kinetic model describing current
sheet thinning in the magnetotail, the processes of its formation are investigated depending on the normal
magnetic field magnitude which affects both the current sheet structure and particle dynamics within ...
Added: April 27, 2026
Tsareva O. O., Malova H. V., V. Yu. Popov et al., Plasma Physics Reports 2026 Vol. 52 No. 2 P. 179–185
The influence of asymmetry of plasma sources on the structure and spatial localization of a superthin
current sheet (STCS) supported by demagnetized electrons is studied using a self-consistent model. The
simulation takes into account the presence of a single plasma source in the northern hemisphere, which
makes the plasma flow asymmetric. It is demonstrated that the asymmetry of ...
Added: April 27, 2026
NY: Association for Computing Machinery (ACM), 2026.
It is our great pleasure to welcome you to the 35th edition of the Web Conference to be held on June 29 – July 3, 2026, in Dubai, United Arab Emirates.
Following discussions with our partners and key stakeholders, we have taken the decision to postpone the ACM Web Conference 2026, initially planned for April 2026. ...
Added: April 23, 2026
Kychkin A., Chernitsin I., Прикладная информатика 2026 Т. 21 № 1 С. 40–58
The results of the development of a software microservice embedded in atmospheric air quality monitoring systems to support the identification of industrial pollution sources are presented. The emission and subsequent spread of harmful substances in the lower layers of the atmosphere is dynamic and characterized by high uncertainty due to the specific features of technological ...
Added: April 23, 2026
IEEE, 2026.
Added: April 21, 2026
Wang M., Xiao Y., Braslavski P. et al., Mathematics 2026 Vol. 14 No. 8 Article 1286
Increasingly shaped by heterogeneous on-chain activity rather than a single shared market process, this study investigates 7-day-ahead forecasting using 147 market and on-chain indicators across eight major blockchain ecosystems from October 2023 to April 2025. We benchmark statistical, deep-learning, and foundation-model baselines under multiple feature-selection pipelines using both error metrics and Diebold–Mariano tests. TiRex achieves ...
Added: April 20, 2026
Shchur L., Antonov D., Burovski E., International Journal of Bifurcation and Chaos in Applied Sciences and Engineering 2026 P. 1–9
We present a simple model that simulates the possible influence of one society on another. Specifically, two societies evolve deterministically according to the well-known Nowak-May spatial game with the addition of mutual influence through connections that reflect the current states of the societies. This may be related to the influence of a global information resource ...
Added: April 20, 2026
Qin X., Deng Y., Shchur L. et al., / Series arXiv "math". 2026. No. 2603.02962.
We perform a Monte Carlo analysis of the Ising model on many three-dimensional lattices. By means of finite-size scaling we obtain the critical points and determine the scaling dimensions. As expected, the critical exponents agree with the three-dimensional Ising universality class for all models. The irrelevant field, as revealed by the correction-to-scaling amplitudes, appears to ...
Added: April 20, 2026
Pilé I., Deng Y., Shchur L., / Series arXiv "math". 2026. No. 2604.10254.
We investigate the spatial overlap of successive spin configurations in Markov chain Monte Carlo simulations using the local Metropolis algorithm and the Svendsen-Wang and Wolff cluster algorithms. We examine the dynamics of these algorithms for two models in different universality classes: the Ising model and the Potts model with three components. The overlap of two ...
Added: April 20, 2026
Ebraheem A., Информационные процессы 2025 Т. 25 № 4 С. 787–798
The article proposes a method for planning the placement of access points and gateways inside buildings for constructing Internet of Things networks. The basis of the method is the use of information from a building information model, which makes it possible to easily take into account both the geometry and the physical and technical characteristics ...
Added: April 19, 2026
Makarov D. M., Kalikin N., Gurikov P. et al., Journal of Supercritical Fluids 2026 Vol. 235 Article 106979
Supercritical CO2 (scCO2 ) is an environmentally friendly solvent, but its low polarity limits the solubility of polar compounds. Cosolvents are commonly used to enhance solvation capability, yet comprehensive datadriven studies are scarce. We compiled the largest dataset to date — 4401 experimental solubility records with 22 cosolvents for 93 nonionic solutes, plus 4855 records ...
Added: April 19, 2026
IEEE, 2026.
A.S. Popov Russian Science and Technical Society with support from V. A. Trapeznikov Institute of Control Sciences, V.A. Kotelnikov Institute of Radio Engineering and Electronics, Autex Ltd. is leading the ХХVIII International Conference «Digital Signal Processing and its Applications — DSPA-2026» ...
Added: April 18, 2026
NY: Association for Computing Machinery (ACM), 2026.
It is our great pleasure to welcome you to the 35th edition of the Web Conference to be held on June 29 – July 3, 2026, in Dubai, United Arab Emirates.
Following discussions with our partners and key stakeholders, we have taken the decision to postpone the ACM Web Conference 2026, initially planned for April 2026. ...
Added: April 17, 2026
Shelkovnikov A., Азия и Африка сегодня 2025 № 7 С. 37–46
В статье рассматриваются перспективы сотрудничества России и Объединенных Арабских Эмиратов (ОАЭ) в области обеспечения информационной безопасности. Выяснено, что данное сотрудничество является частью более широкого взаимодействия, нашедшего правовое закрепление в Декларации о стратегическом сотрудничестве от 1 июня 2018 г. Успех ОАЭ в области развития информационных технологий и обеспечения информационной безопасности связан с устойчивым экономическим ростом, обеспечившим ...
Added: April 16, 2026
Gabdullin N., Androsov I., / Series Computer Science "arxiv.org". 2026.
Label prediction in neural networks (NNs) has O(n) complexity proportional to the number of classes. This holds true for classification using fully connected layers and cosine similarity with some set of class prototypes. In this paper we show that if NN latent space (LS) geometry is known and possesses specific properties, label prediction complexity can ...
Added: April 2, 2026
Panarina M., Предпринимательское право 2026 № 1 С. 36–41
Цифровые права и цифровой оборот становятся неотъемлемой частью современной цифровой экономики и требуют надлежащего правового регулирования и регламентации правил распоряжения своими правами пользователями информационных систем. Необходимость разработки подходов к регулированию общественных отношений в цифровом пространстве с использованием цифровых технологий, повышение киберрисков и рисков информационной безопасности, проблем идентификации и аутентификации сделок с цифровым имуществом, защиты интеллектуальной ...
Added: March 4, 2026
М.: НИЯУ МИФИ, 2025.
Настоящая книга содержит тезисы научных работ и докладов, предложенных специалистами на конференции «КИБ-2025». Представленные материалы выполнены преподавателями, научными сотрудниками, молодыми учеными, аспирантами и студентами МИФИ и других вузов, специалистами академических научных и научно-производственных организаций Москвы и России, сотрудничающих с МИФИ. Работы отражают достижения и уровень исследований, тенденции и проблемы в развитии и обеспечении образования и ...
Added: March 2, 2026
Закомолдин Р. В., Agapov P., В кн.: Российское общество и социально-правовые аспекты его безопасности : Сборник материалов Всероссийской научно-практической конференции с международным участием (Москва, 25–26 апреля 2024 г.).: М.: Университет прокуратуры Российской Федерации, 2024. С. 149–154.
нализируется фейкинг как инструмент пося гательства на государственную, общественную и военную (обо ронную) безопасность. Анализ проводится на примере специаль ной военной операции и дискредитации в связи с этим деятельно сти Вооруженных Сил Российской Федерации, иных войск, воин ских формирований и государственных органов. Отдельное вни мание уделяется соответствующим преступлениям, предусмот ренным ст. 207, 207.1, 207.2, 207.3, ...
Added: January 29, 2026
М.: Университет прокуратуры Российской Федерации, 2024.
В сборнике представлены выступления участников научно-практической конфе ренции «Российское общество и социально-правовые аспекты его безопасности», состоявшейся на базе Университета прокуратуры Российской Федерации 25–26 ап реля 2024 г., а также выработанные по ее итогам рекомендации. В конференции приняли участие представители общественных объединений, научных и образова тельных организаций. Для работников органов прокуратуры, научных и педагогических работников, широкого ...
Added: January 29, 2026
Закомолдин Р. В., Agapov P., Дулькина Л. В., Сибирский юридический вестник 2024 № 2(105) С. 75–82
T he article analyzes faking as one of the tools of encroachment on state, public and military security. It is noted that with the help of fakes, misinformation of society is organized, destructive effects on public consciousness are ensured, and negative public opinion is formed. The analysis is carried out on the example of a ...
Added: January 28, 2026