{"title":"Appling the forward kinematic of the biped robot with 12 DOF based denavit and hartenberg method","authors":"K. Araffa, M. Tkach, Y. Khlaponin","doi":"10.31673/2409-7292.2019.013647","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.013647","url":null,"abstract":"This paper presents Forward kinematics analysis for the Biped Robot Model (AK robot) and focuses on the considered lower body of a 12 DOF biped robot. Each leg modeled as a kinematic chain with Seven links connected by Six revolute joints. The Description and parameters of AK robot was introduced, also in this paper studied the forward kinematics that refers the analytical study. For describing robot kinematics was used Denavit & Hartenberg (D-H) [1] method, which shows that a general transformation between two joints requires four parameters. These parameters known as the D-H parameters of D-H notation which allows the step from a link to the following link by 4 basic transformations that depends only on the robot's constructive characteristics","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125161286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Technology of Control for Multipurpose Robotic Complex Search of Illegal Emitters","authors":"V. Savchenko, O. Matsko, V. Pshonnik","doi":"10.31673/2409-7292.2019.031522","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.031522","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121676919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Email spam protection technology based on DMARC","authors":"O. O. Rode","doi":"10.31673/2409-7292.2022.033238","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.033238","url":null,"abstract":"The article explores the issues of protecting information and communication systems and e-mail from unwanted spam or spam attacks. Theoretical information about spam and its types is provided. The main technologies and methods of protecting communication systems from spam and spam attacks are formulated. The influence of spam on the activity and work of the corporate network is considered. Using a practical example, countermeasure technology is developed and it is shown how spam can affect the network and how you can protect yourself from spam attacks using DMARC technology.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116952099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodology for evaluating informational threats in the conditions of informational conflict","authors":"G. Shuklin","doi":"10.31673/2409-7292.2022.040002","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040002","url":null,"abstract":"The article analyzes modern methods of modeling informational influences, systematizes the problems of optimizing cyberspace protection systems against informational influences. Also, methods of assessing threats in cyberspace were studied and recommendations were developed for optimizing methods of protecting cyberspace from informational influences.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121591376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network monitoring software for improving the effectiveness of network protection","authors":"I. V. Kasovsʹka, O. D. Shapovalenko, I. Lutsenko","doi":"10.31673/2409-7292.2021.014757","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.014757","url":null,"abstract":"The main methods and protocols of network monitoring are given in the work. The general review of properties of software complexes of network monitoring is carried out. The open access software of network security monitoring systems is investigated and the choice of tool for further research is substantiated. Recommendations for network security measures have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124411456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology of protection of confidential information in social networks","authors":"K. S. Irza, D. Guy","doi":"10.31673/2409-7292.2021.021314","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.021314","url":null,"abstract":"The paper presents the main functions of social networks and the data contained in them. Spectra of attacks and countermeasures are considered. Threats and technologies of information protection are investigated and the variant of technology of protection of personal and confidential information in social networks is developed. Introducing the first prototype of P2P Messenger, written in Java, which can run on several operating systems, such as Windows, Linux and MacOS.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122141044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automation of the process of responding to information security incidents of the organization","authors":"S. V. Voloshko","doi":"10.31673/2409-7292.2022.040009","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040009","url":null,"abstract":"The article discusses the process of automating the response to information security incidents of the organization. The main stages of automation planning, key points and a sequence of actions for developing a correct response scenario for a certain type of incident are recommended. As an example, the process of building a scenario for responding to a \"phishing\" incident in accordance with the set of information security solutions defined for the example, which may be available in the organization, is given. The corresponding steps of the response scenario are described in text, plan, and graphic format. A graphic example of the implementation of the developed plan in the SOAR class system is given.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129445317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complexity of Calculation of 3- and 5-Isogenes of Supersingular Curves of Edwards","authors":"A. Bessalov, A. Kotenko, D. Tretyakov","doi":"10.31673/2409-7292.2019.046369","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.046369","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130117952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of internal point methods in cybersecurity problems of intelligent energy systems","authors":"V. V. Samandrula, M. M. Lutsenko","doi":"10.31673/2409-7292.2021.021516","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.021516","url":null,"abstract":"The paper considers approaches to the creation of intelligent energy systems based on WAMS monitoring systems, using information technology in metrology, in the means of receiving, processing and transmitting information and determining parameters in control tasks. The paper analyzes the existing cyberattacks on the SCADA and WAMS system and considers possible ways to solve control problems in terms of information security violations of intelligent energy systems. DoS-attacks are considered in more detail, which lead to the failure of devices that measure currents, voltages and capacities, as well as to the disruption of information processing equipment. The paper proposes an algorithm for estimating the state of cyber defense of the intelligent energy system based on mathematical modeling of the internal states of the system, which allows to obtain the required accuracy of calculations in terms of incomplete information, which is the inability to access measurement data.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131463514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Peculiarities of user identification and authorization in cloud providers based on Microsoft Azure Cloud","authors":"A. H. Zakharzhevsky","doi":"10.31673/2409-7292.2023.020008","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.020008","url":null,"abstract":"This article considers the introduction of authorization and authentication based on cloud providers, due to the growth of their popularity among businesses and companies. An analysis of existing solutions based on various cloud providers was carried out. The existing disadvantages and advantages of each of the solutions were identified and the best solution among the possible existing solutions was determined. The authentication and authorization processes in Amazon Web Services based on Microsoft Azure Cloud were studied.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127804509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}