SIN C

29 papers

YearTitle / Authors
2019A secure priority vehicle movement based on blockchain technology in connected vehicles.
Anil K. Saini, Shreyansh Sharma, Palash Jain, Vikash Sharma, Arvind Kumar Khandelwal
2019Actual and historical state of side channel attacks theory.
Andrey V. Krasovsky, Ekaterina A. Maro
2019Adaptation of an authentication protocol based on asymmetric keys for use in UAV C2 link security systems.
Kirill Borisov, Irina Lubushkina, Sergey Panasenko
2019Analysis of the initial security of the robotics system.
Elena Basan, Oleg B. Makarevich, Evgeny Abramov, Dmitry Popov
2019Applying of digital signal processing techniques to improve the performance of machine learning-based cyber attack detection in industrial control system.
Alexander N. Sokolov, Andrey N. Ragozin, Ilya A. Pyatnitsky, Sergei K. Alabugin
2019Bad-token: denial of service attacks on WPA3.
Karim Lounis, Mohammad Zulkernine
2019Combined authentication schemes with increasing level of resistance and methods for improving the security of electronic signature schemes: kombinirovannye skhemy autentifikacii s povyshennym urovnem stojkosti i metody povysheniya bezopasnosti skhem elektronnoj podpisi.
Antonina Komarova, Anatoly Korobeynikov
2019Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework.
Igor V. Kotenko, Nikolay Komashinsky
2019Cryptographic protocols implementation security verification of the electronic voting system based on blind intermediaries.
Liudmila Babenko, Ilya Pisarev, Elena Popova
2019Development of information security quest based on use of information and communication technologies.
Evgeniya Ishchukova, Ekaterina Maro, Gennady Veselov
2019Development of information security system mathematical models by the solutions of the multigrade Diophantine equation systems.
Valeriy O. Osipyan, Kirill I. Litvinov, R. Kh. Bagdasaryan, E. P. Lukashchik, S. G. Sinitsa, A. S. Zhuk
2019Evaluation of information reliability of complex systems using intuitionistic fuzzy graphs.
Stanislav L. Belyakov, Alexander V. Bozhenyuk, Olesiya Kosenko, Evgeny Kosenko
2019Forecasting complex multi-component time series within systems designed to detect anomalies in dataflows of industrial automated systems.
Andrey N. Ragozin, V. F. Telezhkin, P. S. Podkorytov
2019Hybrid neural network framework for detection of cyber attacks at smart infrastructures.
Vasiliy M. Krundyshev, Maxim O. Kalinin
2019IDS-DL: A description language for detection system in cloud computing.
Mohamed Amine Daoud, Youcef Dahmani, Kadda Mostefaoui
2019Investigation of the different implementations for the new cipher Qamal.
Kunbolat Algazy, Rustem Biyashev, Nursulu Kapalova, Ludmila K. Babenko, Evgeniya Ishchukova, Saule Nyssanbayeva
2019Is it better to choose seen or unseen distracters for graphical passwords.
Abdul Ashraf, Ron Poet
2019Liveness detection methods implementation to face identification reinforcement in gaming services.
Vyacheslav V. Zolotarev, Alina O. Povazhnyuk, Ekaterina A. Maro
2019Managing influence in complex systems to ensure safety of their operation.
Alexander N. Tselykh, Vladislav Vasilev, Larisa A. Tselykh
2019Method of identifying and assessing of automated process control systems vulnerable elements.
Denis Chernov, Alexey Sychugov
2019Modeling of low-rate DDoS-attacks.
Yaroslav Tarasov, Ekaterina Pakulova, Oleg Basov
2019Multi-path multimodal authentication system for remote information system.
Ekaterina Pakulova, Artem Ryndin, Oleg Basov
2019Optimization of the cyber security system structure based on accounting of the prevented damage cost.
Igor V. Kotenko, Igor Saenko, Yury Sineshchuk, Valery Kuvatov, Oleg Chudakov
2019Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019
Oleg B. Makarevich, Dmitry Popov, Ludmila K. Babenko, Pete Burnap, Atilla Elçi, Ron Poet, Jaideep Vaidya, Mehmet A. Orgun, Manoj Singh Gaur, Rajveer Singh Shekhawat
2019Safety analysis of the flow of cartographic data with defects.
Stanislav L. Belyakov, Alexander V. Bozhenyuk, Marina Savelyeva, Marina Belyakova
2019Steganalysis method of static JPEG images based on artificial immune system.
Alexey Nikolaevich Shniperov, Aleksandra Vladimirovna Prokofieva
2019TLS certificate as a sign of establishing a connection with the network Tor.
Vitaly V. Lapshichyov, Oleg B. Makarevich
2019The use of machine learning algorithms for detecting advanced persistent threats.
Hope Nkiruka Eke, Andrei Petrovski, Hatem Ahriz
2019Verification of internet protocol properties using cooperating automaton objects.
Dmitriy Levonevskiy, Fedor Novikov, Ludmila N. Fedorchenko, Irina Afanasieva