Modern information security最新文献

筛选
英文 中文
Appling the forward kinematic of the biped robot with 12 DOF based denavit and hartenberg method 应用基于denavit和hartenberg方法的12自由度双足机器人正运动学
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.013647
K. Araffa, M. Tkach, Y. Khlaponin
{"title":"Appling the forward kinematic of the biped robot with 12 DOF based denavit and hartenberg method","authors":"K. Araffa, M. Tkach, Y. Khlaponin","doi":"10.31673/2409-7292.2019.013647","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.013647","url":null,"abstract":"This paper presents Forward kinematics analysis for the Biped Robot Model (AK robot) and focuses on the considered lower body of a 12 DOF biped robot. Each leg modeled as a kinematic chain with Seven links connected by Six revolute joints. The Description and parameters of AK robot was introduced, also in this paper studied the forward kinematics that refers the analytical study. For describing robot kinematics was used Denavit & Hartenberg (D-H) [1] method, which shows that a general transformation between two joints requires four parameters. These parameters known as the D-H parameters of D-H notation which allows the step from a link to the following link by 4 basic transformations that depends only on the robot's constructive characteristics","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125161286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Technology of Control for Multipurpose Robotic Complex Search of Illegal Emitters 多用途机器人复杂搜索非法发射物的网络控制技术
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.031522
V. Savchenko, O. Matsko, V. Pshonnik
{"title":"Network Technology of Control for Multipurpose Robotic Complex Search of Illegal Emitters","authors":"V. Savchenko, O. Matsko, V. Pshonnik","doi":"10.31673/2409-7292.2019.031522","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.031522","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121676919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Email spam protection technology based on DMARC 基于DMARC的垃圾邮件防护技术
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.033238
O. O. Rode
{"title":"Email spam protection technology based on DMARC","authors":"O. O. Rode","doi":"10.31673/2409-7292.2022.033238","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.033238","url":null,"abstract":"The article explores the issues of protecting information and communication systems and e-mail from unwanted spam or spam attacks. Theoretical information about spam and its types is provided. The main technologies and methods of protecting communication systems from spam and spam attacks are formulated. The influence of spam on the activity and work of the corporate network is considered. Using a practical example, countermeasure technology is developed and it is shown how spam can affect the network and how you can protect yourself from spam attacks using DMARC technology.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116952099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology for evaluating informational threats in the conditions of informational conflict 信息冲突条件下评价信息威胁的方法学
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.040002
G. Shuklin
{"title":"Methodology for evaluating informational threats in the conditions of informational conflict","authors":"G. Shuklin","doi":"10.31673/2409-7292.2022.040002","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040002","url":null,"abstract":"The article analyzes modern methods of modeling informational influences, systematizes the problems of optimizing cyberspace protection systems against informational influences. Also, methods of assessing threats in cyberspace were studied and recommendations were developed for optimizing methods of protecting cyberspace from informational influences.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121591376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network monitoring software for improving the effectiveness of network protection 网络监控软件,提高网络保护的有效性
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.014757
I. V. Kasovsʹka, O. D. Shapovalenko, I. Lutsenko
{"title":"Network monitoring software for improving the effectiveness of network protection","authors":"I. V. Kasovsʹka, O. D. Shapovalenko, I. Lutsenko","doi":"10.31673/2409-7292.2021.014757","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.014757","url":null,"abstract":"The main methods and protocols of network monitoring are given in the work. The general review of properties of software complexes of network monitoring is carried out. The open access software of network security monitoring systems is investigated and the choice of tool for further research is substantiated. Recommendations for network security measures have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124411456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technology of protection of confidential information in social networks 社交网络中的保密信息保护技术
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.021314
K. S. Irza, D. Guy
{"title":"Technology of protection of confidential information in social networks","authors":"K. S. Irza, D. Guy","doi":"10.31673/2409-7292.2021.021314","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.021314","url":null,"abstract":"The paper presents the main functions of social networks and the data contained in them. Spectra of attacks and countermeasures are considered. Threats and technologies of information protection are investigated and the variant of technology of protection of personal and confidential information in social networks is developed. Introducing the first prototype of P2P Messenger, written in Java, which can run on several operating systems, such as Windows, Linux and MacOS.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122141044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation of the process of responding to information security incidents of the organization 对组织的信息安全事件作出响应的过程的自动化
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.040009
S. V. Voloshko
{"title":"Automation of the process of responding to information security incidents of the organization","authors":"S. V. Voloshko","doi":"10.31673/2409-7292.2022.040009","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.040009","url":null,"abstract":"The article discusses the process of automating the response to information security incidents of the organization. The main stages of automation planning, key points and a sequence of actions for developing a correct response scenario for a certain type of incident are recommended. As an example, the process of building a scenario for responding to a \"phishing\" incident in accordance with the set of information security solutions defined for the example, which may be available in the organization, is given. The corresponding steps of the response scenario are described in text, plan, and graphic format. A graphic example of the implementation of the developed plan in the SOAR class system is given.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129445317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complexity of Calculation of 3- and 5-Isogenes of Supersingular Curves of Edwards Edwards超奇异曲线3-和5-等基因计算的复杂性
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.046369
A. Bessalov, A. Kotenko, D. Tretyakov
{"title":"Complexity of Calculation of 3- and 5-Isogenes of Supersingular Curves of Edwards","authors":"A. Bessalov, A. Kotenko, D. Tretyakov","doi":"10.31673/2409-7292.2019.046369","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.046369","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130117952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of internal point methods in cybersecurity problems of intelligent energy systems 内点法在智能能源系统网络安全问题中的应用
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.021516
V. V. Samandrula, M. M. Lutsenko
{"title":"Application of internal point methods in cybersecurity problems of intelligent energy systems","authors":"V. V. Samandrula, M. M. Lutsenko","doi":"10.31673/2409-7292.2021.021516","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.021516","url":null,"abstract":"The paper considers approaches to the creation of intelligent energy systems based on WAMS monitoring systems, using information technology in metrology, in the means of receiving, processing and transmitting information and determining parameters in control tasks. The paper analyzes the existing cyberattacks on the SCADA and WAMS system and considers possible ways to solve control problems in terms of information security violations of intelligent energy systems. DoS-attacks are considered in more detail, which lead to the failure of devices that measure currents, voltages and capacities, as well as to the disruption of information processing equipment. The paper proposes an algorithm for estimating the state of cyber defense of the intelligent energy system based on mathematical modeling of the internal states of the system, which allows to obtain the required accuracy of calculations in terms of incomplete information, which is the inability to access measurement data.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131463514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Peculiarities of user identification and authorization in cloud providers based on Microsoft Azure Cloud 基于Microsoft Azure云的云提供商的用户识别和授权特性
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.020008
A. H. Zakharzhevsky
{"title":"Peculiarities of user identification and authorization in cloud providers based on Microsoft Azure Cloud","authors":"A. H. Zakharzhevsky","doi":"10.31673/2409-7292.2023.020008","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.020008","url":null,"abstract":"This article considers the introduction of authorization and authentication based on cloud providers, due to the growth of their popularity among businesses and companies. An analysis of existing solutions based on various cloud providers was carried out. The existing disadvantages and advantages of each of the solutions were identified and the best solution among the possible existing solutions was determined. The authentication and authorization processes in Amazon Web Services based on Microsoft Azure Cloud were studied.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127804509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信