?
“PERSEUS Technology: New Trends in Information and Communication Security”
Intellectual Archive Bulletin, Abstract ID 491. 2012. P. 21-22.
Filiol E. A.
Language:
English
Keywords: information security
Zakharov V., Varnovsky N. P., Shokurov A. V., Moscow University Computational Mathematics and Cybernetics 2016 Vol. 36 No. 2 P. 83-88
We study a formal model of cloud computing systems with auxiliary cryptoservers. Assuming an existence of a secure threshold somewhat homomorphic public key cryptosystem we show how to build a cloud computing system secure in this model. ...
Added: October 13, 2016
Гудков Ю.И., Шепитько Г.Е., Прокофьев М. Н., В кн. : Современные проблемы и задачи обеспечения информационной безопасности СИБ-2014. : М. : МФЮА, 2014. С. 176-180.
Some provisions of SWOT analysis and assessment of its productivity in business are criticized. ...
Added: April 25, 2014
Galushkin A. I., Pantiukhin D., Avedian E., , in : the 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA). : [б.и.], 2014.
This article presents the results of neural network technologies that are used and can be used in the information systems security. It focuses on two paradigms of neural networks: multilayer neural network and the Cerebellar Model Articulation Controller (the CMAC neural network). ...
Added: September 13, 2016
Baranov P., Beibutov E., Business Informatics 2015 No. 4 P. 71-78
This paperwork overviews core technologies implemented by comparably new products at information security market - web application firewalls. Web applications are a very wide-used and convenient way of presenting remote users with access to corporate information resources. It can however become single point of failure rendering all the information infrastructure unreachable for legitimate clients. To ...
Added: December 5, 2015
Salakhutdinova K. I., Krivtsova I. E., Sukhoparov M. E. et al., , in : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11118 LNCS. Vol. 11118 .: Springer, 2018. P. 318-327.
Statement of Research. A need to reduce the increasing number of system vulnerabilities caused by unauthorized software installed on computer aids necessitates development of an approach to automate the data-storage media audit. The article describes an approach to identification of informative assembly instructions. Also, the influence of a chosen feature that is used to create ...
Added: April 24, 2019
Akatov M., Safonov S., Tuv A., , in : Proceedings of the 2020 IEEE International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS). : IEEE, 2020. Ch. 4. P. 137-139.
Added: November 11, 2020
Savelieva A., Sergey Avdoshin, , in : Emerging Trends in Information Systems: Recent Innovations, Result and Experiences. : Netherlands : Springer, 2016. Ch. 9. P. 99-115.
Today the demand is growing for information security experts capable of analyzing problems and making decisions in business situations that involve risk or uncertainty. These skills can be acquired through systematic studying of various information security incidents. In this paper we propose a framework of methods, tools and taxonomies for analysis of case studies in ...
Added: March 15, 2016
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2019 № 4 С. 0-0
The paper considers error probability in every of four message block integrity checking methods: digital signature, cyclical redundant code, control sums in vector space over a field of two elements and control sums in a ring of integers. Comparison of asymptotic representations of transmitted binary signal and for large transmitted block’s volume is presented in ...
Added: December 29, 2019
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2018 № 4 С. 62-67
The paper examines probability-theoretic models of information distortion at message level. We research control sum distribution segments that are typical for network protocols like TCP.
As an addition operation we use both bitwise coordinate addition and addition of numbers in binary code with carry. Control sum error probability for asymptotic assessments provided distortion probability is low ...
Added: July 31, 2019
Козачок А. В., Копылов С. А., Мещеряков Р. В. et al., Информатика и автоматизация (Труды СПИИРАН) 2018 Т. 5 № 60 С. 128-155
This paper presents an approach to a robust watermark extraction from images containing text. Data extraction based on developed approach to robust watermark embedding into text data, characterizing by conversion invariance of text data into an image format. The comparative analysis of existing approaches of steganographic data embedding into text data is carried out, their ...
Added: September 3, 2019
Zarubin A., Kharitonov S., Денисов Д. В. et al., Прикладная информатика 2020 Т. 15 № 3 (87) С. 75-90
The rapid development of information technologies, the introduction of new cloud services, and the transfer of employees to remote work necessitate the adequate development of data leak Prevention (DLP) systems. The purpose of this article is to determine factors that affect this process and identify main trends in the development of DLP systems in the ...
Added: July 21, 2020
Grinev V. P., Закупки и право 2023 № 1 С. 42-49
Network addresses (IP addresses) and autonomous system numbers (ASN) are considered as Internet
resources. Using the systemic research method, the author analyzes the legal framework governing legal relations in
the sphere of their turnover as objects of procurement to meet state and municipal needs. Recommendations
are formulated for improving the legislation on public procurement, taking into account the ...
Added: July 19, 2023
Феста Ю. Ю., Воробьев И. А., Промышленные АСУ и контроллеры 2021 № 9 С. 30-40
Information security risk event can be interpreted as bank losses associated with imperfect
security systems: vulnerability to DDoS attacks, virus infections, imperfection of fraud
monitoring systems. The draft regulation of the Central Bank of the Russian Federation on the
operational risk management system in a credit institution and a banking group involves taking
into account the component of this ...
Added: September 20, 2021
Модель оценки рисков информационной безопасности информационных систем на основе облачных вычислений
Tsaregorodtsev A. V., Ермошкин Г. Н., Национальная безопасность / nota bene 2013 № 6 С. 46-54
Widespread acceptance and adoption of cloud computing calls for adaptation and development of existing risk assessment models of information systems. The approach suggested in this article can be used for risk assessment of information systems functioning on the basis of cloud computing technology, and assess the effectiveness of security measures. ...
Added: March 17, 2014
[б.и.], 2014
Added: September 13, 2016
Elin V., М. : Московский институт государственного управления и права, 2017
Added: January 31, 2017
Evsyutin O., Култаев П. И., Multimedia Tools and Applications 2021 Vol. 80 No. 7 P. 11217-11238
The paper presents a new algorithm for embedding information in the frequency domain of the discrete wavelet-transform (DWT) of digital images. A block version of quantization index modulation (QIM) is used as a basic embedding operation. A distinctive feature of the algorithm consists in the adaptive selection of the data block size depending on the ...
Added: December 24, 2020
Samodurov V., Kornilov V., Isaev E., Вопросы оборонной техники. Серия 16: Технические средства противодействия терроризму 2016 № 7-8 С. 139-145
The paper examines the main problems of ensuring information security of cloud technologies, technical and legislative. It discussed the ways to improve the security of cloud computing: the choice of the most secure cloud model, legal ways to improve the security of cloud. ...
Added: October 16, 2016
Baranov A., Baranov P., Проблемы информационной безопасности. Компьютерные системы 2019 № 3 С. 35-40
Control sum mechanism efficiency research aimed at distortion revealing in a message being transmitted is a relevant task that is solved using different possible information transfer operation condition models.
In the paper distortions are modelled as an overlay of noise component with low signal/noise ratio , which poses most practical interest. Considered class of control sums ...
Added: December 29, 2019
Дейнеко А. Г., Информационное право 2022 № 1 (71) С. 31-34
Purpose. The article will analyze the Russian legislation about the operation of self-driving cars, as well as the prospects for its development. The main theoretical and practical difficulties of legal regulation of the operation of self-driving cars on public roads will be identified. Also the ways to overcome them will be proposed. Attention will also ...
Added: May 20, 2022
Elin V., Вестник Академии права и управления 2016 № 3 (44) С. 78-84
The peculiarities of information security in the implementation of cloud services in the Russian Federation in view of the legal characteristics of cloud services providers, status information as an object of legal regulation, the characteristics of restricted information and specifi conclusion of civil law contracts. ...
Added: November 17, 2016
Baranov A., Baranov P. A., Automatic Control and Computer Sciences 2016 Vol. 50 No. 8 P. 765-772
The authors of [1, 2] suggested a model of information distortion by white noise. The present work discusses the asymptotic behavior of CRC error probabilities at low values of p, which is the probability of distortion of transferred information bits. On the basis of the theoretical results in two specific protocols—Е1 and ETSI EN 302307—as ...
Added: March 16, 2017
Manglayev T., Kizilirmak R. C., Kho Y. H. et al., , in : 17TH IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES, EUROCON 2017. : Institute of Electrical and Electronics Engineers Inc., 2017. P. 22-25.
In this paper, non-orthogonal multiple access (NOMA) with successive interference cancellation (SIC) technique for downlink channel of next generation wireless network and its security issues are discussed. In NOMA, signals for all user equipment (UEs) are superimposed before transmission and then decoded at each UE implementing SIC. SIC relies on decoding and subtracting the signals ...
Added: April 26, 2019
Shumskaya O. O., Iskhakov A., Iskhakova A. O., , in : Futuristic Trends in Network and Communication Technologies: Third International Conference, FTNCT 2020, Taganrog, Russia, October 14–16, 2020, Revised Selected Papers. * 1.: Springer, 2021. P. 134-143.
Added: October 17, 2021