Zobrazeno 1 - 10
of 60
pro vyhledávání: '"Konstantin Kogos"'
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 776, Iss 20, Pp 62-68 (2017)
This paper focuses on continuous user authentication based on its interaction with the device. Behavioral authentication provides the ability to partially abandon passwords. Furthermore, the use of human behavior, for example, how he holds the device
Externí odkaz:
https://doaj.org/article/9af0bee2509947b7b5b280d3fa7969fd
Autor:
Anna Belozubova, Konstantin Kogos
Publikováno v:
Procedia Computer Science. 213:453-462
Publikováno v:
Bezopasnostʹ Informacionnyh Tehnologij, Vol 28, Iss 3, Pp 56-64 (2021)
The aim of this paper is to describe the created method for identifying network covert channels. Traditionally, the scheme for countering information leakage through covert channels is divided into several stages. The first stage is the covert channe
Autor:
Anna Belozubova, Konstantin Kogos
Publikováno v:
BICA
Covert channel is a communication channel that was not designed for information transmission. It is proven that in some circumstances the attacker has an ability to build a covert channel that cannot be detected. That is why the method of capacity li
Publikováno v:
BICA
Currently, due to the development and widespread use of communication systems, information security problems are very acute. Very often information leakage causes huge damage to both organizations and individuals. One of the mechanisms to organize in
Publikováno v:
Journal of Computer Virology and Hacking Techniques.
Autor:
Artem Sokolov, Konstantin Kogos
Publikováno v:
Procedia Computer Science. 169:400-406
Covert channels are used for information transmission in a manner that is not intended for communication and is difficult to detect. Methods of active covert channels detection may be insecure. Therefore, it is better to use approaches that limit cov
Publikováno v:
2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus).
Covert channel is a communication channel that was not designed for information transmission. Covert channels in IP networks can be implemented in a way that is difficult to detect. That is why the method of capacity limitation of a potential covert
Autor:
Konstantin Kogos, Anna Sidorova
Publikováno v:
FedCSIS
Almost all people's data is stored on their personal devices. There is a need to protect information from unauthorized access. PIN codes, passwords, tokens can be forgotten, lost, transferred, brute-force attacked. For this reason, biometric authenti
Publikováno v:
2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).
This paper represents a new approach to rainbow tables, a method of password recovery that was originally developed by Martin E. Hellman and then improved by P. Oechslin, so most of its implementations use Oechslin’s modification. An improvement re