№ 2 (42)

Content of 2nd issue of magazine «Voprosy kiberbezopasnosti» at 2021:

Title Pages
COGNITIVE MODELING OF THE CYBER ATTACK VECTOR BASED ON CAPEC METHODS

Vasilyev V.I., Kirillova A.D., Vulfin A.M.

2-16
MODEL OF A “PHISHING” TYPE OF COMPUTER ATTACK ON A LOCAL COMPUTER NETWORK

Dobryshin M. M., Zakalkin P. V.

17-25
TOPOLOGICAL METHODS OF ANALYSIS IN BEHAVIORAL ANALYTICS SYSTEMS

Nashivochnikov N., Pustarnakov V.F.

26-36
CRYPTOGRAPHIC RECURSIVE CONTROL OF INTEGRITY OF METADATA ELECTRONIC DOCUMENTS. PART 4. EVALUATION OF RESULTS

D.I. Tali, O.A. Finko

37-50
ACTIVE MONITORING MODEL AS A BASIS FOR SECURITY MANAGEMENT OF INDUSTRIAL CPS

Poltavtseva M.A.

51-60
ANALYSIS OF VULNERABILITIES OF KEY MANAGEMENT SYSTEMS IN DISTRIBUTED LEDGER USING THE EXAMPLE OF THE IBM BLOCKCHAIN

Plotkin A.S., Kesel S.A., Repin M.M., Fedorov N.V.

61-70
SECURITY AUDIT LOGGING IN MICROSERVICE-BASED SYSTEMS: SURVEY OF ARCHITECTURE PATTERNS

Barabanov A., Makrushin D.

71-80
CYBER RESILIENT PLATFORM FOR INTERNET OF THINGS (IIOT/IOT)ED SYSTEMS: SURVEY OF ARCHITECTURE PATTERNS

Petrenko S.A.

81-91

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.