Search Results - "Revyakina Elena"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Development of a secure video chat based on the WebRTC standard for video conferencing by Revyakina, Elena

    Published in E3S web of conferences (01-01-2023)
    “…The article describes the process of developing a secure video chat based on the WebRTC standard for establishing a connection and exchanging information…”
    Get full text
    Journal Article
  2. 2

    Creation of an encryption algorithm resistant to attacks through side channels of leakage by Cherckesova, Larissa, Revyakina, Elena, Buryakova, Olga, Gazizov, Andrey

    Published in E3S web of conferences (2024)
    “…The paper is devoted to.the development of an encryption algorithm resistant to leakage through side channels The objectives of the work were the development…”
    Get full text
    Journal Article
  3. 3

    Using machine learning to forecast hard drive failures by Kodatsky, Nikita, Revyakina, Elena, Gazizov, Andrei, Gunko, Vitaliy

    Published in E3S web of conferences (2024)
    “…The aim of this research is to develop an effective tool for assessing the condition of computer hardware based on an intelligent method. The outcome of this…”
    Get full text
    Journal Article
  4. 4

    Circuit engineering solutions for high - temperature analog microcircuits in extreme environmental conditions by Dzhurov, Alexandr, Lyashenko, Kirill, Revyakina, Elena, Cherckesova, Larissa

    Published in E3S web of conferences (01-01-2023)
    “…The current geopolitical situation and import–substitution challenges facing the domestic electronics industry require the creation of devices capable of…”
    Get full text
    Journal Article
  5. 5

    Implementation of steganographic software for hiding information in mpeg video files by Romanov, Artem, Safaryan, Olga, Cherckesova, Larisa, Revyakina, Elena

    Published in E3S web of conferences (01-01-2023)
    “…This article is devoted to the implementation of a steganographic software tool for hiding infor-mation in MPEG video files. The method of least significant…”
    Get full text
    Journal Article
  6. 6

    Development of modification of the post-quantum public-key cryptosystem NTRUENCRYPT by Lyashenko, Nikita, Cherckesova, Larisa, Revyakina, Elena, Medvedev, Dmitry, Gavlitsky, Alexander

    Published in E3S web of conferences (01-01-2023)
    “…This work is devoted to the development of a modification of the post-quantum public-key cryptosystem NTRUEncrypt. Given that two main requirements for modern…”
    Get full text
    Journal Article
  7. 7

    Searching for and blocking destructive content in images by Zelensky, Alexander, Cherkesova, Larisa, Revyakina, Elena, Kulikova, Olga, Trubchik, Irina

    Published in E3S Web of Conferences (01-01-2023)
    “…Children and underage teenagers use the Internet not only for communication. So, for 2020, children aged five to seven years in half of cases use the network…”
    Get full text
    Journal Article Conference Proceeding
  8. 8

    Internet platform for analyzing computer memory of Windows operating systems for conducting information security investigations by Tretyak, Michael, Cherckesova, Larisa, Korochentsev, Denis, Revyakina, Elena, Popov, Alexey

    Published in E3S web of conferences (01-01-2023)
    “…Within the framework of this article, an analysis of the dynamics of the growth of information security incidents identified in companies by specialists of the…”
    Get full text
    Journal Article
  9. 9

    System for detecting of potentially dangerous communications of network users by Zelensky, Alexander, Cherkesova, Larisa, Revyakina, Elena, Boldyrikhin, Nikolay, Klimova, Elena, Yengibaryan, Irina

    Published in E3S Web of Conferences (01-01-2023)
    “…This work is devoted to the processes of organizing internal information security at the enterprise. The scheme of a software tool for monitoring employee…”
    Get full text
    Journal Article Conference Proceeding
  10. 10

    Increase in the efficiency of water transport of bulk mineral cargo by the segregation of feedstock at the initial technological stage by Lyashenko, Yuriy, Menshenina, Elena, Revyakina, Elena

    Published in E3S web of conferences (01-01-2021)
    “…The paper gives the analysis of the volume of transportation of bulk mineral cargoes by water transport. It is established that the problem of the use of…”
    Get full text
    Journal Article Conference Proceeding
  11. 11

    Development of a system for protecting against DDoS attacks at the L7 level of the OSI model - HTTP Flood by Razumov, Pavel, Lyashenko, Kirill, Cherckesova, Larissa, Revyakina, Elena, Yengibaryan, Irina, Revyakin, Alexander

    Published in E3S web of conferences (01-01-2023)
    “…In today’s world of globalization and the development of information technology, it is not possible to build a business and production without using the latest…”
    Get full text
    Journal Article
  12. 12

    Ensuring the security of web applications operating on the basis of the SSL/TLS protocol by Razumov, Pavel, Cherckesova, Larissa, Revyakina, Elena, Morozov, Sergey, Medvedev, Dmitry, Lobodenko, Andrei

    Published in E3S web of conferences (01-01-2023)
    “…SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as…”
    Get full text
    Journal Article
  13. 13

    Development of safety monitor from destructive influences of web–sites and social networks of internet by Cherckesova, Larisa, Zelensky, Alexandr, Revyakina, Elena, Safaryan, Olga, Korochentsev, Denis

    Published in E3S web of conferences (2021)
    “…This article discusses the main age-related features of the Internet use by adolescents and children. Today more and more computers are connected to the…”
    Get full text
    Journal Article Conference Proceeding
  14. 14

    Development of a real-time document approval system by Cherckesova, Larisa, Boldyrikhin, Nikolay, Revyakina, Elena, Safaryan, Olga, Yengibaryan, Irina

    Published in E3S Web of Conferences (2021)
    “…The article describes the preparation of the document approval system before the start of development, the project architecture, and testing. The work…”
    Get full text
    Journal Article Conference Proceeding
  15. 15

    Digitalization of the agro-industrial complex: analysis of existing vulnerabilities in quantum cryptography systems by Cherkesova, Larisa, Korochencev, Denis, Revyakina, Elena, Boldyrihin, Nikolay, Roshchina, Evgeniya

    Published in E3S Web of Conferences (01-01-2020)
    “…This article deals with vulnerabilities of quantum cryptography systems and quantum key distribution. Solutions that exclude the possibility of quantum attacks…”
    Get full text
    Journal Article Conference Proceeding
  16. 16

    The complexity of student-led research: from terminology to practice in a case study of three countries by Khanolainen, Daria, Cooper, Victoria, Messer, David, Revyakina, Elena

    Published in Oxford review of education (02-01-2024)
    “…Preparing young people to meet emerging contemporary challenges has become a global imperative. Over two decades, there has been a call for students' active…”
    Get full text
    Journal Article
  17. 17

    The development of countermeasures against session hijacking by Cherckesova Larissa, Revyakina Elena, Roshchina Evgeniya, Porksheyan Vitaliy

    Published in E3S web of conferences (01-01-2024)
    “…This article provides information about Session Hijacking and discusses countermeasures to prevent Session Hijacking attacks. In modern web applications and…”
    Get full text
    Journal Article