System for analyzing and preventing threats to the security of personal data in an enterprise
Authors: Levinskiy A.T. | Published: 17.05.2019 |
Published in issue: #5(34)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-5-474 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: DLP-systems, safety, efficiency, Zecurion DLP, HTTP, FTP, blocking, array, data, protocol |
Interpolation implementation of Bayer pattern to PLIC in video stream processing tasks
Authors: Malygina S.V. | Published: 06.06.2019 |
Published in issue: #5(34)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-5-481 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: PLIC video stream processing, gamma correction, Bayer pattern, bilinear interpolation, image filtering, RAW, RAW converter, parallel programming |
The minimax algorithm and its implementation on the example of the noughts-and-crosses game
Authors: Zhdanov N.A., Burkhanova Yu.M., Voronetskiy Yu.O. | Published: 06.06.2019 |
Published in issue: #5(34)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-5-482 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: minimax algorithm, alpha-beta clipping, recursion, evaluation function, Python, noughts-and-crosses, maximization, minimization, branch and bound method |
Data encryption in telecommunication networks
Authors: Dolova A.A., Konstantinidi A.Yu. | Published: 06.06.2019 |
Published in issue: #5(34)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-5-484 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: encryption, telecommunications, networks, algorithm, RSA, AES, data, protection |
Radio electronic equipment shielding
Authors: Karpov I.N. | Published: 06.06.2019 |
Published in issue: #6(35)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-6-489 | |
Category: Informatics, Computer Engineering and Control | Chapter: Automation, Control of Technological Processes, and Industrial Control | |
Keywords: radio electronic equipment, shielding, protective shields, electromagnetic field, shielding materials, electromagnetic compatibility, interference, shielding efficiency |
Ensuring the failure-resistant access of web applications to highly-load servers
Authors: Olisevich E.A. | Published: 24.06.2019 |
Published in issue: #6(35)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-6-493 | |
Category: Informatics, Computer Engineering and Control | Chapter: Automation, Control of Technological Processes, and Industrial Control | |
Keywords: fault-tolerant access, clustering, optimization, high load, servers, web application, replication, sharding, cluster, cashing, database |
Half step to successful employment
Authors: Pekshev N.A., Sinitsyn N.S. | Published: 30.07.2019 |
Published in issue: #7(36)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-7-504 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: polygraph, polygraph examination, human memory trace, potential employee, screening procedure, employer, psychological testing |
Simulation of server software work
Authors: Shatunov A.E. | Published: 31.07.2019 |
Published in issue: #7(36)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-7-506 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: simulation model, discrete event simulation, server software, microservice design style, queuing system, application, server, denial of service |
DDOS attack detection and prevention methods
Authors: Kadyrov R.R. | Published: 06.08.2019 |
Published in issue: #7(36)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-7-507 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, denial of service attack, DoS, DDoS, detection and prevention mechanisms, architecture of mitigating the attacks consequences, false positives, access to resources |
Extended Kalman filter application to the nonlinear two-link pendulum model
Authors: Lysukho G.V., Maslennikov A.L. | Published: 20.08.2019 |
Published in issue: #8(37)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-8-513 | |
Category: Informatics, Computer Engineering and Control | Chapter: System Analysis, Control, and Information Processing, Statistics | |
Keywords: extended Kalman filter, Hybrid Kalman filter, nonlinear system, two-link pendulum, numerical differentiation, QR-decomposition, state estimation, estimation theory |