Search Results - "Zegzhda, D. P."

Refine Results
  1. 1

    Providing security for automated process control systems at hydropower engineering facilities by Vasiliev, Y. S., Zegzhda, P. D., Zegzhda, D. P.

    Published in Thermal engineering (2016)
    “…This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering…”
    Get full text
    Journal Article
  2. 2

    Empirical Study of the Stability of a Linear Filter Based on the Neyman–Pearson Criterion to Changes in the Average Values by Ognev, R. A., Zegzhda, D. P.

    Published in Automatic control and computer sciences (01-12-2023)
    “…— The statement about the stability of a linear filter built based on the Neyman–Pearson criterion is verified by performing falsifying experiments. No…”
    Get full text
    Journal Article
  3. 3

    Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code by Kubrin, G. S., Zegzhda, D. P.

    Published in Automatic control and computer sciences (01-12-2023)
    “…This article analyzes the existing methods for searching for software vulnerabilities. For methods using deep learning models on a graph representation of the…”
    Get full text
    Journal Article
  4. 4

    Digital Manufacturing Security Indicators by Zegzhda, D. P., Pavlenko, E. Yu

    Published in Automatic control and computer sciences (01-12-2018)
    “…— This paper describes security indicators specific to digital manufacturing. We divided the set of indicators into three groups: self-similarity-based…”
    Get full text
    Journal Article
  5. 5

    Bank Fraud Detection with Graph Neural Networks by Sergadeeva, A. I., Lavrova, D. S., Zegzhda, D. P.

    Published in Automatic control and computer sciences (01-12-2022)
    “…— This study proposes a method for detecting bank fraud based on graph neural networks. Financial transactions are represented in the form of a graph and…”
    Get full text
    Journal Article
  6. 6

    Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model by Demidov, R. A., Zegzhda, P. D., Kalinin, M. O.

    Published in Automatic control and computer sciences (01-12-2018)
    “…The article discusses the problem of analysis of cybersecurity threats in wireless ad hoc networks—VANET, FANET, MARINET, MANET, WSN. The problem of neural…”
    Get full text
    Journal Article
  7. 7

    Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity by Lavrova, D. S., Bogina, V. M., Zegzhda, D. P., Pavlenko, E. Yu

    Published in Automatic control and computer sciences (01-12-2023)
    “…In the paper, we propose an approach to estimate the cyber resilience of mobile networks based on an estimate of the probability that the network will remain…”
    Get full text
    Journal Article
  8. 8

    Assessment of the Effectiveness of an Information Security System by Zegzhda, D. P., Saurenko, T. N., Anisimov, V. G., Anisimov, E. G.

    Published in Automatic control and computer sciences (01-12-2023)
    “…This article discusses a methodological approach to building models for assessing the effectiveness of a program (project) for creating or modernizing an…”
    Get full text
    Journal Article
  9. 9

    Sustainability as a criterion for information security in cyber-physical systems by Zegzhda, D. P.

    “…A new point of view on security of cyber-physical systems as a single complex combining both physical and information components is presented. An approach is…”
    Get full text
    Journal Article
  10. 10

    Big Data Management System Security Threat Model by Poltavtseva, M. A., Zegzhda, D. P., Kalinin, M. O.

    Published in Automatic control and computer sciences (01-12-2019)
    “…— The article considers the concept and features of Big Data management systems and their differences from traditional DBMS’s. The authors describe changes in…”
    Get full text
    Journal Article
  11. 11

    Counteraction the cybersecurity threats of the in-vehicle local network by Pavlenko, E. Y., Vasileva, K. V., Lavrova, D. S., Zegzhda, D. P.

    “…This paper focuses on creating a solution to counter cyber threats to the local network of modern vehicles at the level of architecture, topology and…”
    Get full text
    Journal Article
  12. 12

    Requirements on Providing a Sustainability of Industrial Internet of Things by Dakhnovich, A. D., Moskvin, D. A., Zegzhda, D. P.

    Published in Automatic control and computer sciences (01-12-2021)
    “…This article studies the definitions of industrial Internet of Things (IIoT) used by the contemporary academic community. The study helps derive the most…”
    Get full text
    Journal Article
  13. 13

    Data protection in heterogeneous big data systems by Poltavtseva, M. A., Aleksandrova, E. B., Shmatov, V. S., Zegzhda, P. D.

    “…Modern Big Data systems are notable for their scale and, often, their distributed organization. A feature of a number of Big Data systems is the use of…”
    Get full text
    Journal Article
  14. 14

    Cyber-sustainability of Software-Defined Networks Based on Situational Management by Zegzhda, D. P., Pavlenko, E. Yu

    Published in Automatic control and computer sciences (01-12-2018)
    “…— The correctness and efficiency of the homeostatic approach to ensuring cyber-sustainability based on the software-defined networking (SDN) technology is…”
    Get full text
    Journal Article
  15. 15

    Application of an Artificial Neural Network for Detection of Attacks in VANETs by Malyshev, E. V., Moskvin, D. A., Zegzhda, D. P.

    Published in Automatic control and computer sciences (01-12-2019)
    “…This work contains results of developing an approach for detecting routing attacks in VANET networks using an artificial neural network. In the course of this…”
    Get full text
    Journal Article
  16. 16

    Detection of Malicious Executable Files Based on Clustering of Activities by Ognev, R. A., Zhukovskii, E. V., Zegzhda, D. P.

    Published in Automatic control and computer sciences (01-12-2021)
    “…The application of classification algorithms for malware detection is studied. The classes of activities obtained as a result of clustering are based on…”
    Get full text
    Journal Article
  17. 17

    Using Security-through-Obscurity Principle in an Industrial Internet of Things by Dakhnovich, A. D., Moskvin, D. A., Zegzhda, D. P.

    Published in Automatic control and computer sciences (01-12-2021)
    “…Considering the openness of industrial Internet-of-Things systems as compared with conventional SCADA-like systems, the provision of sustainable and continuous…”
    Get full text
    Journal Article
  18. 18

    Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks by Zegzhda, P. D., Lavrova, D. S., Shtyrkina, A. A.

    Published in Automatic control and computer sciences (01-12-2018)
    “…— This paper proposes to use multifractal analysis to detect backbone network traffic anomalies that indicate network failures or attacks. Multifractal…”
    Get full text
    Journal Article
  19. 19

    Detecting Malicious Executable Files Based on Static–Dynamic Analysis Using Machine Learning by Ognev, R. A., Zhukovskii, E. V., Zegzhda, D. P., Kiselev, A. N.

    Published in Automatic control and computer sciences (01-12-2022)
    “…In current operating systems, executable files are used to solve various problems, which in turn can be either benign (perform only necessary actions) or…”
    Get full text
    Journal Article
  20. 20

    Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems by Zegzhda, D. P., Suprun, A. F., Anisimov, V. G., Tebekin, A. V., Anisimov, E. G.

    Published in Automatic control and computer sciences (01-12-2023)
    “…A methodological approach to construct models for predicting indicators of properties of information security systems at evolutionary stages of development is…”
    Get full text
    Journal Article