Search Results - "Poltavtseva, M. A."
-
1
Data Modeling in Big Data Systems Including Polystore and Heterogeneous Information Processing Components
Published in Automatic control and computer sciences (01-12-2023)“…This paper is studies modeling data in big data systems, including polystores and other heterogeneous information processing components. Currently, several…”
Get full text
Journal Article -
2
Formation of Data Structures in the Problems of Active Security Monitoring
Published in Automatic control and computer sciences (01-12-2021)“…The trend towards automation of security management processes, including in industrial cyber-physical systems, has led to a change in the role of information…”
Get full text
Journal Article -
3
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Published in Automatic control and computer sciences (01-12-2019)“…— This article considers the solution to the problem of building secure Big Data management systems using a consistent approach. The concept and features of…”
Get full text
Journal Article -
4
Confidentiality of Machine Learning Models
Published in Automatic control and computer sciences (01-12-2023)“…This article is about ensuring the confidentiality of models using machine learning systems. The aim of this study is to ensure the confidentiality of models…”
Get full text
Journal Article -
5
Applying Distributed Ledger Technology to Auditing and Incident Investigation in Big Data Processing Systems
Published in Automatic control and computer sciences (01-12-2022)“…— In this work, the problem of ensuring the auditing of granular transformations in heterogeneous big data processing systems is considered. Distributed ledger…”
Get full text
Journal Article -
6
Adversarial Machine Learning Protection Using the Example of Evasion Attacks on Medical Images
Published in Automatic control and computer sciences (01-12-2022)“…This work considers evasion attacks on machine learning (ML) systems that use medical images in their analysis. Their systematization and a practical…”
Get full text
Journal Article -
7
Methods of Multidimensional Aggregation of Time Series of Streaming Data for Cyber-Physical System Monitoring
Published in Automatic control and computer sciences (01-12-2022)“…— Data aggregation methods are developed and studied to increase the performance of intrusion detection systems in cyber-physical systems (CPS’s). What makes…”
Get full text
Journal Article -
8
Framework for Modeling Security Policies of Big Data Processing Systems
Published in Automatic control and computer sciences (01-12-2023)“…This paper studies automatizing the analysis of access control in big data management systems by modeling security policies. It analyzes modern methods of…”
Get full text
Journal Article -
9
Big Data Management System Security Threat Model
Published in Automatic control and computer sciences (01-12-2019)“…— The article considers the concept and features of Big Data management systems and their differences from traditional DBMS’s. The authors describe changes in…”
Get full text
Journal Article -
10
Data protection in heterogeneous big data systems
Published in Journal of Computer Virology and Hacking Techniques (01-09-2023)“…Modern Big Data systems are notable for their scale and, often, their distributed organization. A feature of a number of Big Data systems is the use of…”
Get full text
Journal Article -
11
Modeling Big Data Management Systems in Information Security
Published in Automatic control and computer sciences (01-12-2019)“…— The article presents a model of a Big Data management system for solving information security (IS) problems for systems of this class. The features of the…”
Get full text
Journal Article -
12
A Distributed Intrusion Detection System with Protection from an Internal Intruder
Published in Automatic control and computer sciences (01-12-2018)“…The protection of modern distributed information networks from external and internal intruders continues to be of great importance due to the development of…”
Get full text
Journal Article -
13
Problems of Security in Digital Production and Its Resistance to Cyber Threats
Published in Automatic control and computer sciences (01-12-2018)“…— This paper considers digital production as a stage of industrialization. One aspect of this process is the associated digital transformation of control…”
Get full text
Journal Article -
14
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Published in Automatic control and computer sciences (01-12-2019)“…We propose an approach to assess the security of computer systems based on case analysis. To implement case analysis, it is proposed to use the graph…”
Get full text
Journal Article -
15
Intelligent data analysis in decision support systems for penetration tests
Published in Automatic control and computer sciences (2017)“…Intelligent data analysis is extensively applied in various fields of technology, including information security. The development of decision support systems…”
Get full text
Journal Article -
16
Systematization and security assessment of cyber-physical systems
Published in Automatic control and computer sciences (2017)“…In this paper, the features of cyber-physical systems (CPSs) from the point of view of information security have been considered and CPSs have been classified…”
Get full text
Journal Article -
17
Approaches to Modeling the Security of Cyberphysical Systems
Published in Automatic control and computer sciences (01-12-2018)“…— This paper considers features of cyberphysical systems (CPSs) as complexes combining physical and information components. Approaches to modeling CPSs based…”
Get full text
Journal Article -
18
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
Published in Automatic control and computer sciences (01-12-2018)“…— This paper is devoted to solving the problem of developing a case-based decision support system for information security problems. The source data can be…”
Get full text
Journal Article -
19
Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster
Published in Automatic control and computer sciences (2016)“…An approach to preliminary processing of data from the Internet of Things is suggested. The suggested procedure is based on data aggregation and normalization…”
Get full text
Journal Article -
20
Building an Adaptive System for Collecting and Preparing Data for Security Monitoring
Published in Automatic control and computer sciences (01-12-2020)“…— The task of collecting and preparing data for CPS security monitoring is formulated. A method for simulation and evaluation of a system for collecting and…”
Get full text
Journal Article