All articles by "Glinskaya E.V."
Analysis of vulnerabilities in programming in different languages
| Authors: Andreev A.M., Kuznetsov M.A., Savinchukov V.N., Sadkov F.M., Glinskaya E.V. | Published: 19.10.2025 |
| Published in issue: #5(100)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: vulnerabilities, programming languages, software, cybersecurity, cyberattacks, secure digital environment | |
Detection and prevention of botnets in cybersecurity
| Authors: Losev N.S., Glinskaya E.V. | Published: 17.10.2025 |
| Published in issue: #5(100)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: botnet, botmaster, detection, attacker, machine learning, cybersecurity, DDoS attack, malware | |
An overview of defensive and offensive artificial intelligence in cybersecurity
| Authors: Amanatidi V.S., Glinskaya E.V. | Published: 17.10.2025 |
| Published in issue: #5(100)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: artificial intelligence, machine learning, artificial intelligence-based cyber defense systems, competitive artificial intelligence, development methodology, reinforcement learning, vulnerabilities | |
Field-effect transistors
| Authors: Paragulgov A.M., Glinskaya E.V. | Published: 27.09.2025 |
| Published in issue: #4(99)/2025 | |
| DOI: DOI: | |
| Category: Instrument Engineering, Metrology, Information-Measuring Instruments and Systems | Chapter: Solid-state electronics, radioelectronic components, micro - and nanoelectronics | |
| Keywords: field-effect transistors, control p-n junction, current-voltage characteristics, high input resistance, analog circuits, photodiode amplifier, frequency properties, variable resistance | |
Security in the Web applications
| Authors: Glinskaya E.V., Bubnovich V.A. | Published: 29.06.2025 |
| Published in issue: #3(98)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: data protection, information security, web applications, cybercrime, API vulnerabilities, XSS attacks, DDoS attacks | |
Characteristics of the Linux malware: conclusions and recent trends
| Authors: Tonoyan A.K., Glinskaya E.V. | Published: 29.04.2025 |
| Published in issue: #2(97)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: malware, forensics, Internet of Things, embedded systems, data analytics, machine learning, expert systems | |
Hyperwallet: cryptocurrency wallet as a secure hypervisor-based application
| Authors: Vakhromeev D.A., Glinskaya E.V. | Published: 09.04.2025 |
| Published in issue: #2(97)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: secure cryptocurrency wallet, hypervisor, secure communication, attack protection, virtualization, transaction security, sandbox, hardware security | |
Analyzing organizational and legal aspects of the information security tools operation in the organization
| Authors: Sokolovsky V.E., Glinskaya E.V. | Published: 18.02.2025 |
| Published in issue: #1(96)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: information security, state information systems, protection class, protection level, information security tools, Federal Service for Technical and Export Control, Federal Security Service, significant object of critical information infrastructure, certification tests | |
Security and threats overview in the machine learning
| Authors: Losev N.S., Glinskaya E.V. | Published: 14.02.2025 |
| Published in issue: #1(96)/2025 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: machine learning, countermeasure strategies, intruder attack data protection, protection methods, attack models, vulnerabilities, critical infrastructure | |
Secure software development as a component in the system ensuring the organization information security
| Authors: Sokolovsky V.E., Glinskaya E.V. | Published: 17.07.2024 |
| Published in issue: #3(92)/2024 | |
| DOI: DOI: | |
| Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
| Keywords: information technology, software, ensuring information security, analyzer programs, programmer errors, process of organizing secure development | |
