Search Results - "Dakhnovich, A. D."
-
1
Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering
Published in Automatic control and computer sciences (01-12-2023)“…— The security of recommendation systems with collaborative filtering from manipulation attacks is considered. The most common types of attacks are analyzed…”
Get full text
Journal Article -
2
Requirements on Providing a Sustainability of Industrial Internet of Things
Published in Automatic control and computer sciences (01-12-2021)“…This article studies the definitions of industrial Internet of Things (IIoT) used by the contemporary academic community. The study helps derive the most…”
Get full text
Journal Article -
3
Using Security-through-Obscurity Principle in an Industrial Internet of Things
Published in Automatic control and computer sciences (01-12-2021)“…Considering the openness of industrial Internet-of-Things systems as compared with conventional SCADA-like systems, the provision of sustainable and continuous…”
Get full text
Journal Article -
4
Analysis of the Information Security Threats in the Digital Production Networks
Published in Automatic control and computer sciences (01-12-2018)“…The article analyzes the information security threats arising when constructing digital production networks; presents the problems, which the cybersecurity…”
Get full text
Journal Article -
5
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
Published in Automatic control and computer sciences (01-12-2019)“…This paper presents the issues of cybersecurity of the industrial internet of things as the main driver for the development of Enterprise 4.0, compared with…”
Get full text
Journal Article -
6
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Published in Automatic control and computer sciences (01-12-2018)“…— This article considers the particular characteristics of guaranteeing cybersecurity in new-generation industrial networks and analyzes the main threats and…”
Get full text
Journal Article -
7
Protection of Wi-Fi network users against rogue access points
Published in Automatic control and computer sciences (2017)“…Results of an analysis of the mechanisms for protecting Wi-Fi networks have been presented. A Wi-Fi access point authentication method that can be used in…”
Get full text
Journal Article -
8
A Technique for Safely Transforming the Infrastructure of Industrial Control Systems to the Industrial Internet of Things
Published in Automatic control and computer sciences (01-12-2020)“…— This article describes the transformation of an enterprise en route from the conventional construction according to the Industrial Control Systems (ICS)…”
Get full text
Journal Article