Search Results - "Shtyrkina, A. A."
-
1
Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks
Published in Automatic control and computer sciences (01-12-2023)“…This paper presents a model of threats in cyber-physical systems (CPSs) with examples of attacks and potential negative consequences for systems for various…”
Get full text
Journal Article -
2
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks
Published in Automatic control and computer sciences (01-12-2018)“…— This paper proposes to use multifractal analysis to detect backbone network traffic anomalies that indicate network failures or attacks. Multifractal…”
Get full text
Journal Article -
3
Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation
Published in Automatic control and computer sciences (01-12-2018)“…— This article presents mathematical tools of wavelet transformations for use in detecting network traffic attacks. The technique consists in discrete wavelet…”
Get full text
Journal Article -
4
Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters
Published in Automatic control and computer sciences (01-12-2019)“…The authors propose an approach for the prevention of network denial of service attacks, which is based on predicting the values of the multiple correlation…”
Get full text
Journal Article -
5
Directed Digital Signature on Isogenies of Elliptic Curves
Published in Automatic control and computer sciences (01-12-2018)“…A protocol for directed digital signature is proposed on isogenies of elliptic curves, in which only a specific recipient, whose signature key was used to…”
Get full text
Journal Article -
6
Elliptic curves generation for isogeny-based cryptosystems
Published in Automatic control and computer sciences (2017)“…Methods of generating supersingular and ordinary elliptic curves for isogeny-based cryptosystems have been studied. The influence of the class field polynomial…”
Get full text
Journal Article -
7
The Analysis of Artificial Neural Network Structure Recovery Possibilities Based on the Theory of Graphs
Published in Automatic control and computer sciences (01-12-2020)“…In the paper, the problem of the possibility of recovering the unknown structure of artificial neural networks (ANNs) using the theory of graphs is…”
Get full text
Journal Article -
8
Isogeny-Based Cryptographic Access Control
Published in Automatic control and computer sciences (01-12-2020)“…— Cryptographic access control is a relatively new concept that implements the access control rules of some subjects to an object using cryptographic…”
Get full text
Journal Article