Search Results - "Shtyrkina, A. A."

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks by Aleksandrova, E. B., Shtyrkina, A. A.

    Published in Automatic control and computer sciences (01-12-2023)
    “…This paper presents a model of threats in cyber-physical systems (CPSs) with examples of attacks and potential negative consequences for systems for various…”
    Get full text
    Journal Article
  2. 2

    Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks by Zegzhda, P. D., Lavrova, D. S., Shtyrkina, A. A.

    Published in Automatic control and computer sciences (01-12-2018)
    “…— This paper proposes to use multifractal analysis to detect backbone network traffic anomalies that indicate network failures or attacks. Multifractal…”
    Get full text
    Journal Article
  3. 3

    Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation by Lavrova, D. S., Alekseev, I. V., Shtyrkina, A. A.

    Published in Automatic control and computer sciences (01-12-2018)
    “…— This article presents mathematical tools of wavelet transformations for use in detecting network traffic attacks. The technique consists in discrete wavelet…”
    Get full text
    Journal Article
  4. 4

    Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters by Lavrova, D. S., Popova, E. A., Shtyrkina, A. A.

    Published in Automatic control and computer sciences (01-12-2019)
    “…The authors propose an approach for the prevention of network denial of service attacks, which is based on predicting the values of the multiple correlation…”
    Get full text
    Journal Article
  5. 5

    Directed Digital Signature on Isogenies of Elliptic Curves by Aleksandrova, E. B., Shtyrkina, A. A.

    Published in Automatic control and computer sciences (01-12-2018)
    “…A protocol for directed digital signature is proposed on isogenies of elliptic curves, in which only a specific recipient, whose signature key was used to…”
    Get full text
    Journal Article
  6. 6

    Elliptic curves generation for isogeny-based cryptosystems by Aleksandrova, E. B., Shtyrkina, A. A., Yarmak, A. V.

    “…Methods of generating supersingular and ordinary elliptic curves for isogeny-based cryptosystems have been studied. The influence of the class field polynomial…”
    Get full text
    Journal Article
  7. 7

    The Analysis of Artificial Neural Network Structure Recovery Possibilities Based on the Theory of Graphs by Lavrova, D. S., Shtyrkina, A. A.

    Published in Automatic control and computer sciences (01-12-2020)
    “…In the paper, the problem of the possibility of recovering the unknown structure of artificial neural networks (ANNs) using the theory of graphs is…”
    Get full text
    Journal Article
  8. 8

    Isogeny-Based Cryptographic Access Control by Aleksandrova, E. B., Shtyrkina, A. A., Yarmak, A. V.

    Published in Automatic control and computer sciences (01-12-2020)
    “…— Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic…”
    Get full text
    Journal Article