All articles by "Glinskaya E.V."
Characteristics of the Linux malware: conclusions and recent trends
Authors: Tonoyan A.K., Glinskaya E.V. | Published: 29.04.2025 |
Published in issue: #2(97)/2025 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: malware, forensics, Internet of Things, embedded systems, data analytics, machine learning, expert systems |
Hyperwallet: cryptocurrency wallet as a secure hypervisor-based application
Authors: Vakhromeev D.A., Glinskaya E.V. | Published: 09.04.2025 |
Published in issue: #2(97)/2025 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: secure cryptocurrency wallet, hypervisor, secure communication, attack protection, virtualization, transaction security, sandbox, hardware security |
Analyzing organizational and legal aspects of the information security tools operation in the organization
Authors: Sokolovsky V.E., Glinskaya E.V. | Published: 18.02.2025 |
Published in issue: #1(96)/2025 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, state information systems, protection class, protection level, information security tools, Federal Service for Technical and Export Control, Federal Security Service, significant object of critical information infrastructure, certification tests |
Security and threats overview in the machine learning
Authors: Losev N.S., Glinskaya E.V. | Published: 14.02.2025 |
Published in issue: #1(96)/2025 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: machine learning, countermeasure strategies, intruder attack data protection, protection methods, attack models, vulnerabilities, critical infrastructure |
Secure software development as a component in the system ensuring the organization information security
Authors: Sokolovsky V.E., Glinskaya E.V. | Published: 17.07.2024 |
Published in issue: #3(92)/2024 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information technology, software, ensuring information security, analyzer programs, programmer errors, process of organizing secure development |
Development and problems in using artificial intelligence in the information security
Authors: Volodin A.A., Glinskaya E.V. | Published: 01.05.2024 |
Published in issue: #2(91)/2024 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: artificial intelligence, machine learning, information security, classified information protection, audit, monitoring, risk management, vulnerability identification, threat prevention |