Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Vitaliy M. Porksheyan"'
Autor:
Ivan A. Smirnov, Artem M. Romanov, Olga Safaryan, Pavel Razumov, Denis A. Korochentsev, Nickolay V. Boldyrikhin, Larissa V. Cherckesova, Vitaliy M. Porksheyan
Publikováno v:
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS).
The article is devoted to the optimization of intrusion detection system resources when monitoring a set of network objects. The application of the approach proposed in the article makes it possible to optimally distribute the computing resources of
Autor:
Larissa V. Cherckesova, Ivan A. Smirnov, Olga Safaryan, Pavel Razumov, Sergey A. Osikov, Denis A. Korochentsev, Nickolay V. Boldyrikhin, Vitaliy M. Porksheyan
Publikováno v:
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS).
One of most relevant cyberattacks are DDoS–attacks, purpose of which is failure (denial) of service by server. Its successful implementation limits, or ensures the inaccessibility of information system resources located on server, to all its users.
Autor:
Ivan A. Smirnov, Larissa V. Cherckesova, Olga Safaryan, Pavel A. Chub, Pavel Razumov, Nickolay V. Boldyrikhin, Denis A. Korochentsev, Vitaliy M. Porksheyan
Publikováno v:
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS).
The proposed work considers the development of the cryptographic protocol IAS2019, which allows you to protect the public key in an open communication channel. The advantage of this protocol is that it can be integrated with other cryptographic proto
Autor:
Olga Safaryan, Larissa V. Cherckesova, Boris A. Akishin, Olga N. Manaenkova, Evgeniy V. Palekha, Vitaliy M. Porksheyan, Irina S. Trubchik, Sergey A. Morozov
Publikováno v:
EWDTS
This paper presents the practical implementation of the electronic voting Web-system. Analysis of the developed algorithm was carried out, which was taken as basis in practical implementation of software product. Developed software product can be use
Autor:
Yelena Revyakina, Andrey G. Lobodenko, Ivan A. Smirnov, Nickolay V. Boldyrikhin, Vitaliy M. Porksheyan, Olga Safaryan, Pavel Razumov, Larissa V. Cherckesova
Publikováno v:
EWDTS
Investigations of cryptographic algorithms for today are very actually in connection with cybernetic attacks threat and necessity of information protection at the enterprises of various levels including the strategic appointment. The project implemen
Autor:
Irina Reshetnikova, Nikita Ye. Myzdrikov, Vasiliy I. Yukhnov, Olga Safaryan, Vitaliy M. Porksheyan, Andrey G. Lobodenko, Larissa V. Cherckesova, Ivan Ye. Semeonov
Publikováno v:
EWDTS
This article will consider the probability test of Solovey-Strassen, to determine the simplicity of the number and its possible modifications. This test allows for the shortest possible time to determine whether the number is prime or not. C# program
Autor:
Olga Safaryan, Vitaliy M. Porksheyan, Ivan A. Sakharov, Sergey A. Morozov, Andrey G. Lobodenko, Victor V. Zhilin, Irina I. Drozdova, Larissa V. Cherckesova
Publikováno v:
EWDTS
In this report, the known models of safety were considered. The general description of algorithm of three-dimensional model of safety of computer systems was provided. The relations arising between subjects of model of safety were described, and vari
Autor:
Andrey G. Lobodenko, Vitaliy M. Porksheyan, Alexander I. Zhukov, Sergey A. Klyokta, Nikita I. Chesnokov, Irina A. Pilipenko, Larissa V. Cherckesova, Olga Safaryan
Publikováno v:
EWDTS
In the framework of this article, general information on the block cipher TEA was reviewed, including the history of its creation, advantages and disadvantages, as well as details of the process of encryption and decryption. Three main vulnerabilitie
Autor:
Vitaliy M. Porksheyan, Tatyana Nikishina, Sergey Andryushchenko, Olga Safaryan, Yelena Revyakina, Larissa V. Cherckesova
Publikováno v:
E3S Web of Conferences, Vol 217, p 03009 (2020)
This article is devoted to the issue of regulating traffic congestion in major cities of the world using artificial neural networks. Research is aimed at developing import – substituting automated intelligent system that uses artificial neural netw