№ 5 (24)

cybersecurity_2014

 

Content of 5th issue of magazine «Voprosy kiberbezopasnosti» at 2017:

Title Pages
BIG DATA TECHNOLOGIES FOR SECURITY EVENT CORRELATION BASED ON EVENT TYPE ACCOUNTING
Kotenko Igor, Fedorchenko Andrey, Saenko Igor, Kushnerevich Alexey
2-16
THE RELATIONSHIP OF THE EVENT MANAGEMENT PROCESS WITH OTHER MANAGEMENT PROCESSES OF THE ENTERPRISE
Kuznetcov Aleksandr
17-22
INVESTIGATION OF THE USE OF NEURAL NETWORKS FOR DETECTING LOW-INTENSIVE DDoS-ATAK OF APPLIED LEVEL
Tarasov Yaroslav
23-29
ASSESSMENT OF ENTROPY OF INFORMATION SECURITY SYSTEMS
Livshitz Ilya, Neklydov Adrew
30-41
ANALISYS OF WAYS TO SECURE GROUP CONTROL FOR AUTONOMUS MOBILE ROBOTS
Basan Alexander, Basan Elena, Makarevich Oleg
42-49
THE CONCEPT OF EXTERNAL ITERATIONDESIGN APPEARANCE A PROACTIVE SYSTEMS INFORMATION SECURITY
Gorbachev Igor
50-63
THE CONFIDENTIAL DATA DIVIDED TRANSMISSION SCHEME BASED ON DIFFERENTIAL CALCULUS OF POLYNOMIALS IN SEVERAL VARIABLES OVER PRIME GALOIS FIELDS
Deundyak Vladimir, Mogilevskaya Nadia
64-71
EVALUATION OF THE SURVIVABILITY OF INTEGRATED INFORMATION-TELECOMMUNICATION NETWORKS
Iskolnyy Boris, Maximov Roman, Sharifullin Sergey
72-82
THE MODEL OF FORMATION THE REQUIREMENTS FOR INFORMATION SECURITY TO THE DEVELOPED AUTOMATED SYSTEMS IN THE PROTECTED EXECUTION
Bibashov Sergey
83-90
PASSWORD AUTHENTICATION AND CONTINUOUS AUTHENTICATION BY KEYSTROKE DYNAMICS USING MATHEMATICAL STATISTICS
Krutohvostov Dmitry, Khitsenko Vladimir
91-99

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.