Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Peter D. Zegzhda"'
Autor:
E. G. Anisimov, P. V. Sem’yanov, T. N. Saurenko, V. P. Los, Peter D. Zegzhda, Vladimir Anisimov, A. F. Suprun
Publikováno v:
Automatic Control and Computer Sciences. 54:864-870
A methodological approach to evaluation of the efficiency of information security in the information-control subsystem of a complex dynamic system is proposed. As an efficiency index, we have used the degree of realization of possibilities of the con
Publikováno v:
Automatic Control and Computer Sciences. 54:930-936
An optimization mathematical model and an algorithm of complexification of the measures providing information security are presented. As an indicator of complexification efficiency, the level of the costs of execution of the tasks of providing the in
Autor:
I. V. Alekseev, Peter D. Zegzhda
Publikováno v:
Automatic Control and Computer Sciences. 54:922-929
An overview of network attacks and vulnerabilities of the TCP/IP model with respect to each layer is given using a number of protocols as an example. The purpose of this study is to identify the most common types of network protocol vulnerabilities t
Publikováno v:
Nonlinear Phenomena in Complex Systems. 23:280-290
The paper reviews prospects of using domain architecture as a basis for implementing the car network security mechanism, based on the ECU authentication. It contains an analysis of the existing methods of domain formation and proposes a method for a
Publikováno v:
Nonlinear Phenomena in Complex Systems. 22:375-382
The paper considers a combination of modern artificial neural networks (ANN) that solves the security relative task of intrusion prevention and vulnerabilities detection in cybernetic infrastructure with dynamic network topology. Self-organizing netw
Publikováno v:
Automatic Control and Computer Sciences. 52:1022-1028
This article proposes an approach to identifying integer overflow vulnerabilities in software represented by the executable code of x86 architecture. The approach is based on symbolic code execution and initially twofold representation of memory cell
Autor:
Daria S. Lavrova, Peter D. Zegzhda, Maria A. Poltavtseva, Alexander I. Pechenkin, Elizaveta Zaitseva
Publikováno v:
Automatic Control and Computer Sciences. 52:918-930
This paper is devoted to solving the problem of developing a case-based decision support system for information security problems. The source data can be described as heterogeneous semistructured objects and formalized as property vectors. An approac
Publikováno v:
Automatic Control and Computer Sciences. 52:901-905
This paper considers the possibility of using prefractal graph theory to ensure information security of Vehicular ad hoc Networks (VANETs) and describes prefractal graph recognition algorithms developed for this purpose.
Publikováno v:
Automatic Control and Computer Sciences. 52:1105-1110
The structure of the process and the model for the formation of strategy and a program of innovative development of the information security system in the transport sector are considered.
Publikováno v:
Automatic Control and Computer Sciences. 52:936-944
This paper proposes to use multifractal analysis to detect backbone network traffic anomalies that indicate network failures or attacks. Multifractal spectrum characteristics are used as security metrics. The effectiveness of the proposed approach is