Research and statistical analysis of attacks on neural networks in technical vision tasks
Authors: Kapitonova L.I., Ushakova A.A., Shalna N.A., Storozheva A.A. | Published: 15.02.2019 |
Published in issue: #2(31)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-2-443 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: neural network, dataset, hostile attack, protection against attacks, neural network vulnerabilities, gradient method, pixel attacks, security administrator |
The information security threats conditioned by incorrect password selection
Authors: Sukhorukova N.A. | Published: 15.02.2019 |
Published in issue: #2(31)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-2-444 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information protection, information security threats, password compromise, password cracking methods, password entropy, password resistance, password rating, password selection |
Synthesis and recognition of artificial biometric images
Authors: Rychkov A.S. | Published: 13.03.2019 |
Published in issue: #3(32)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-3-451 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: биометрический образ, метод генерации отпечатков пальцев, цифровое изображение, гистограмма, фильтрация, отпечаток пальца, алгоритм распознавания, шумы на цифровом изображении |
Assessment of the reliability of information collected from social networks
Authors: Kharlamov N.L., Latysheva L.A. | Published: 18.03.2019 |
Published in issue: #3(32)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-3-452 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: social network, social graph, community highlighting, search for bots, public opinion leaders, virtual users, algorithm for detecting bots |
The ways of noise-immunity improvement in the radio channels
Authors: Filatov V.I., Borukaeva A.O., Berdikov P.G. | Published: 27.03.2019 |
Published in issue: #3(32)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-3-455 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: data transfer, radio communication, code division, modulation, bandwidth, security, noise immunity, signal-to-noise ratio |
The study of the CryptoAPI Linux encryption alghoritms in the context of work with the USB-drivers
Authors: Borodin D.S., Fedorov P.V. | Published: 03.04.2019 |
Published in issue: #4(33)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-4-459 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: USB driver, loadable kernel module, CryptoAPI, encryption, symmetric encryption algorithms, AES, DES, Cast6, ARC4 |
Application of modern technologies in the production automation
Authors: Ginsberg K.B., Balashov A.D. | Published: 04.04.2019 |
Published in issue: #4(33)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-4-462 | |
Category: Informatics, Computer Engineering and Control | Chapter: Automation, Control of Technological Processes, and Industrial Control | |
Keywords: radio frequency identification, wireless sensor network, printed circuit boards, manufacturing, tag, memory, mark, antenna, production automation |
Detection of bots in social networks by means of multilayered perceptron
Authors: Khachatryan M.G., Chepik P.I. | Published: 09.04.2019 |
Published in issue: #4(33)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-4-463 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: social networks, Twitter, bot, account, neural networks, cross-validation, metric, classification |
Analysis of algorithms for automatic arrangement of entities and construction of communications
Authors: Kiriakov E.A., Levinskiy A.T. | Published: 30.04.2019 |
Published in issue: #4(33)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-4-469 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: algorithm, automation, connections, constructions, genetic algorithm, model, genetic, analytical, mutation, arrangement of entities, construction of connections |
Algorithms of searching for admissible solutions to construct the matrix of the game in the problem of choice of protection objects under the restrictions on resources
Authors: Koshman A.A. | Published: 07.05.2019 |
Published in issue: #4(33)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-4-471 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information protection, game theory, Boolean programming, game matrix, optimal strategy, object of protection, resource restriction, incomplete enumeration, decision tree |