| 2019 | A secure priority vehicle movement based on blockchain technology in connected vehicles. Anil K. Saini, Shreyansh Sharma, Palash Jain, Vikash Sharma, Arvind Kumar Khandelwal |
| 2019 | Actual and historical state of side channel attacks theory. Andrey V. Krasovsky, Ekaterina A. Maro |
| 2019 | Adaptation of an authentication protocol based on asymmetric keys for use in UAV C2 link security systems. Kirill Borisov, Irina Lubushkina, Sergey Panasenko |
| 2019 | Analysis of the initial security of the robotics system. Elena Basan, Oleg B. Makarevich, Evgeny Abramov, Dmitry Popov |
| 2019 | Applying of digital signal processing techniques to improve the performance of machine learning-based cyber attack detection in industrial control system. Alexander N. Sokolov, Andrey N. Ragozin, Ilya A. Pyatnitsky, Sergei K. Alabugin |
| 2019 | Bad-token: denial of service attacks on WPA3. Karim Lounis, Mohammad Zulkernine |
| 2019 | Combined authentication schemes with increasing level of resistance and methods for improving the security of electronic signature schemes: kombinirovannye skhemy autentifikacii s povyshennym urovnem stojkosti i metody povysheniya bezopasnosti skhem elektronnoj podpisi. Antonina Komarova, Anatoly Korobeynikov |
| 2019 | Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework. Igor V. Kotenko, Nikolay Komashinsky |
| 2019 | Cryptographic protocols implementation security verification of the electronic voting system based on blind intermediaries. Liudmila Babenko, Ilya Pisarev, Elena Popova |
| 2019 | Development of information security quest based on use of information and communication technologies. Evgeniya Ishchukova, Ekaterina Maro, Gennady Veselov |
| 2019 | Development of information security system mathematical models by the solutions of the multigrade Diophantine equation systems. Valeriy O. Osipyan, Kirill I. Litvinov, R. Kh. Bagdasaryan, E. P. Lukashchik, S. G. Sinitsa, A. S. Zhuk |
| 2019 | Evaluation of information reliability of complex systems using intuitionistic fuzzy graphs. Stanislav L. Belyakov, Alexander V. Bozhenyuk, Olesiya Kosenko, Evgeny Kosenko |
| 2019 | Forecasting complex multi-component time series within systems designed to detect anomalies in dataflows of industrial automated systems. Andrey N. Ragozin, V. F. Telezhkin, P. S. Podkorytov |
| 2019 | Hybrid neural network framework for detection of cyber attacks at smart infrastructures. Vasiliy M. Krundyshev, Maxim O. Kalinin |
| 2019 | IDS-DL: A description language for detection system in cloud computing. Mohamed Amine Daoud, Youcef Dahmani, Kadda Mostefaoui |
| 2019 | Investigation of the different implementations for the new cipher Qamal. Kunbolat Algazy, Rustem Biyashev, Nursulu Kapalova, Ludmila K. Babenko, Evgeniya Ishchukova, Saule Nyssanbayeva |
| 2019 | Is it better to choose seen or unseen distracters for graphical passwords. Abdul Ashraf, Ron Poet |
| 2019 | Liveness detection methods implementation to face identification reinforcement in gaming services. Vyacheslav V. Zolotarev, Alina O. Povazhnyuk, Ekaterina A. Maro |
| 2019 | Managing influence in complex systems to ensure safety of their operation. Alexander N. Tselykh, Vladislav Vasilev, Larisa A. Tselykh |
| 2019 | Method of identifying and assessing of automated process control systems vulnerable elements. Denis Chernov, Alexey Sychugov |
| 2019 | Modeling of low-rate DDoS-attacks. Yaroslav Tarasov, Ekaterina Pakulova, Oleg Basov |
| 2019 | Multi-path multimodal authentication system for remote information system. Ekaterina Pakulova, Artem Ryndin, Oleg Basov |
| 2019 | Optimization of the cyber security system structure based on accounting of the prevented damage cost. Igor V. Kotenko, Igor Saenko, Yury Sineshchuk, Valery Kuvatov, Oleg Chudakov |
| 2019 | Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019 Oleg B. Makarevich, Dmitry Popov, Ludmila K. Babenko, Pete Burnap, Atilla Elçi, Ron Poet, Jaideep Vaidya, Mehmet A. Orgun, Manoj Singh Gaur, Rajveer Singh Shekhawat |
| 2019 | Safety analysis of the flow of cartographic data with defects. Stanislav L. Belyakov, Alexander V. Bozhenyuk, Marina Savelyeva, Marina Belyakova |
| 2019 | Steganalysis method of static JPEG images based on artificial immune system. Alexey Nikolaevich Shniperov, Aleksandra Vladimirovna Prokofieva |
| 2019 | TLS certificate as a sign of establishing a connection with the network Tor. Vitaly V. Lapshichyov, Oleg B. Makarevich |
| 2019 | The use of machine learning algorithms for detecting advanced persistent threats. Hope Nkiruka Eke, Andrei Petrovski, Hatem Ahriz |
| 2019 | Verification of internet protocol properties using cooperating automaton objects. Dmitriy Levonevskiy, Fedor Novikov, Ludmila N. Fedorchenko, Irina Afanasieva |