|
|
|
Olga Tushkanova, Diana Levshun, Alexander Branitskiy, Elena Fedorchenko, Evgenia Novikova and Igor Kotenko
Cyberattacks on cyber-physical systems (CPS) can lead to severe consequences, and therefore it is extremely important to detect them at early stages. However, there are several challenges to be solved in this area; they include an ability of the security...
ver más
|
|
|
|
|
|
|
Elena V. Novikova, Mariia A. Trimonova, Sergey B. Turuntaev, Evgeny V. Zenchenko and Petr E. Zenchenko
This work presents an analysis of data obtained through unique laboratory experiments on hydraulic fracturing. In the experiments, sufficiently large artificial samples were used to model a reservoir. Thus, it was possible to simulate several wells simul...
ver más
|
|
|
|
|
|
|
Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko and Sergei Verevkin
Currently, enhancing the efficiency of vulnerability detection and assessment remains relevant. We investigate a new approach for the detection of vulnerabilities that can be used in cyber attacks and assess their severity for further effective responses...
ver más
|
|
|
|
|
|
|
Sergey Golubev, Evgenia Novikova and Elena Fedorchenko
Recently, approaches based on the transformation of tabular data into images have gained a lot of scientific attention. This is explained by the fact that convolutional neural networks (CNNs) have shown good results in computer vision and other image-bas...
ver más
|
|
|
|
|
|
|
Elena Fedorchenko, Evgenia Novikova and Anton Shulepov
In order to provide an accurate and timely response to different types of the attacks, intrusion and anomaly detection systems collect and analyze a lot of data that may include personal and other sensitive data. These systems could be considered a sourc...
ver más
|
|
|
|
|
|
|
Evgenia Novikova, Elena Doynikova and Sergey Golubev
One of the challenges in the Internet of Things systems is the security of the critical data, for example, data used for intrusion detection. The paper research construction of an intrusion detection system that ensures the confidentiality of critical da...
ver más
|
|
|
|
|
|
|
Elena Doynikova, Evgenia Novikova and Igor Kotenko
Early detection of the security incidents and correct forecasting of the attack development is the basis for the efficient and timely response to cyber threats. The development of the attack depends on future steps available to the attackers, their goals...
ver más
|
|
|
|
|
|
|
Aleksandr A. Novikov,Elena V. Novikova,Elena V. Moiseyeva,Larisa E. Fatikhova,Olga V. Ruzakova,Lenar R. Khairullin
Pág. 256 - 263
The relevance of the article is reasoned by the strategies? definition for perspective innovation policy of economic systems. In conditions of the Federal state entities? autonomy strengthening one of the strategies for perspective innovative policy of e...
ver más
|
|
|
|
|
|
|
Boris V. Zalivanskiy,Elena V. Samokhvalova,Lidia P. Novikova,Irina V. Taranova,Tatyana U. Anopchenko,Anatoly J. Glushko
Pág. 121 - 126
Economic support of the population in the Russian Federation suggests ways to interact with the help of which the specialists of social work have an impact on material and moral, national, family and other social interests and needs of subjects of social...
ver más
|
|
|
|