Search Results - "Zegzhda, D. P."
-
1
Providing security for automated process control systems at hydropower engineering facilities
Published in Thermal engineering (2016)“…This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering…”
Get full text
Journal Article -
2
Empirical Study of the Stability of a Linear Filter Based on the Neyman–Pearson Criterion to Changes in the Average Values
Published in Automatic control and computer sciences (01-12-2023)“…— The statement about the stability of a linear filter built based on the Neyman–Pearson criterion is verified by performing falsifying experiments. No…”
Get full text
Journal Article -
3
Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code
Published in Automatic control and computer sciences (01-12-2023)“…This article analyzes the existing methods for searching for software vulnerabilities. For methods using deep learning models on a graph representation of the…”
Get full text
Journal Article -
4
Digital Manufacturing Security Indicators
Published in Automatic control and computer sciences (01-12-2018)“…— This paper describes security indicators specific to digital manufacturing. We divided the set of indicators into three groups: self-similarity-based…”
Get full text
Journal Article -
5
Bank Fraud Detection with Graph Neural Networks
Published in Automatic control and computer sciences (01-12-2022)“…— This study proposes a method for detecting bank fraud based on graph neural networks. Financial transactions are represented in the form of a graph and…”
Get full text
Journal Article -
6
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model
Published in Automatic control and computer sciences (01-12-2018)“…The article discusses the problem of analysis of cybersecurity threats in wireless ad hoc networks—VANET, FANET, MARINET, MANET, WSN. The problem of neural…”
Get full text
Journal Article -
7
Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity
Published in Automatic control and computer sciences (01-12-2023)“…In the paper, we propose an approach to estimate the cyber resilience of mobile networks based on an estimate of the probability that the network will remain…”
Get full text
Journal Article -
8
Assessment of the Effectiveness of an Information Security System
Published in Automatic control and computer sciences (01-12-2023)“…This article discusses a methodological approach to building models for assessing the effectiveness of a program (project) for creating or modernizing an…”
Get full text
Journal Article -
9
Sustainability as a criterion for information security in cyber-physical systems
Published in Automatic control and computer sciences (2016)“…A new point of view on security of cyber-physical systems as a single complex combining both physical and information components is presented. An approach is…”
Get full text
Journal Article -
10
Big Data Management System Security Threat Model
Published in Automatic control and computer sciences (01-12-2019)“…— The article considers the concept and features of Big Data management systems and their differences from traditional DBMS’s. The authors describe changes in…”
Get full text
Journal Article -
11
Counteraction the cybersecurity threats of the in-vehicle local network
Published in Journal of Computer Virology and Hacking Techniques (01-09-2023)“…This paper focuses on creating a solution to counter cyber threats to the local network of modern vehicles at the level of architecture, topology and…”
Get full text
Journal Article -
12
Requirements on Providing a Sustainability of Industrial Internet of Things
Published in Automatic control and computer sciences (01-12-2021)“…This article studies the definitions of industrial Internet of Things (IIoT) used by the contemporary academic community. The study helps derive the most…”
Get full text
Journal Article -
13
Data protection in heterogeneous big data systems
Published in Journal of Computer Virology and Hacking Techniques (01-09-2023)“…Modern Big Data systems are notable for their scale and, often, their distributed organization. A feature of a number of Big Data systems is the use of…”
Get full text
Journal Article -
14
Cyber-sustainability of Software-Defined Networks Based on Situational Management
Published in Automatic control and computer sciences (01-12-2018)“…— The correctness and efficiency of the homeostatic approach to ensuring cyber-sustainability based on the software-defined networking (SDN) technology is…”
Get full text
Journal Article -
15
Application of an Artificial Neural Network for Detection of Attacks in VANETs
Published in Automatic control and computer sciences (01-12-2019)“…This work contains results of developing an approach for detecting routing attacks in VANET networks using an artificial neural network. In the course of this…”
Get full text
Journal Article -
16
Detection of Malicious Executable Files Based on Clustering of Activities
Published in Automatic control and computer sciences (01-12-2021)“…The application of classification algorithms for malware detection is studied. The classes of activities obtained as a result of clustering are based on…”
Get full text
Journal Article -
17
Using Security-through-Obscurity Principle in an Industrial Internet of Things
Published in Automatic control and computer sciences (01-12-2021)“…Considering the openness of industrial Internet-of-Things systems as compared with conventional SCADA-like systems, the provision of sustainable and continuous…”
Get full text
Journal Article -
18
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks
Published in Automatic control and computer sciences (01-12-2018)“…— This paper proposes to use multifractal analysis to detect backbone network traffic anomalies that indicate network failures or attacks. Multifractal…”
Get full text
Journal Article -
19
Detecting Malicious Executable Files Based on Static–Dynamic Analysis Using Machine Learning
Published in Automatic control and computer sciences (01-12-2022)“…In current operating systems, executable files are used to solve various problems, which in turn can be either benign (perform only necessary actions) or…”
Get full text
Journal Article -
20
Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems
Published in Automatic control and computer sciences (01-12-2023)“…A methodological approach to construct models for predicting indicators of properties of information security systems at evolutionary stages of development is…”
Get full text
Journal Article