All articles by "Glinskaya E.V."
Analyzing organizational and legal aspects of the information security tools operation in the organization
Authors: Sokolovsky V.E., Glinskaya E.V. | Published: 18.02.2025 |
Published in issue: #1(96)/2025 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, state information systems, protection class, protection level, information security tools, Federal Service for Technical and Export Control, Federal Security Service, significant object of critical information infrastructure, certification tests |
Security and threats overview in the machine learning
Authors: Losev N.S., Glinskaya E.V. | Published: 14.02.2025 |
Published in issue: #1(96)/2025 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: machine learning, countermeasure strategies, intruder attack data protection, protection methods, attack models, vulnerabilities, critical infrastructure |
Secure software development as a component in the system ensuring the organization information security
Authors: Sokolovsky V.E., Glinskaya E.V. | Published: 17.07.2024 |
Published in issue: #3(92)/2024 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information technology, software, ensuring information security, analyzer programs, programmer errors, process of organizing secure development |
Development and problems in using artificial intelligence in the information security
Authors: Volodin A.A., Glinskaya E.V. | Published: 01.05.2024 |
Published in issue: #2(91)/2024 | |
DOI: DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: artificial intelligence, machine learning, information security, classified information protection, audit, monitoring, risk management, vulnerability identification, threat prevention |