NBI Technologies最新文献

筛选
英文 中文
Reducing the Risk of Information Security of Subjects of Decentralized Autonomous Organizations 降低分散自治组织主体的信息安全风险
NBI Technologies Pub Date : 2021-03-01 DOI: 10.15688/nbit.jvolsu.2020.3.1
Yulia Bahracheva, Arina Alеeva
{"title":"Reducing the Risk of Information Security of Subjects of Decentralized Autonomous Organizations","authors":"Yulia Bahracheva, Arina Alеeva","doi":"10.15688/nbit.jvolsu.2020.3.1","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.3.1","url":null,"abstract":"The purpose of this work is to reduce the risk of information security of subjects of decentralized autonomous organizations. For this purpose, a mathematical model of the audit of information security of subjects of decentralized autonomous organizations was developed.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133769756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Formal Model of the Research of Methods for Determining the Reliability of Information Systems 信息系统可靠性确定方法研究的形式化模型的建立
NBI Technologies Pub Date : 2021-03-01 DOI: 10.15688/nbit.jvolsu.2020.3.2
A. Bochkarev, A. Babenko
{"title":"Development of a Formal Model of the Research of Methods for Determining the Reliability of Information Systems","authors":"A. Bochkarev, A. Babenko","doi":"10.15688/nbit.jvolsu.2020.3.2","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.3.2","url":null,"abstract":"The state of reliability is the main indicator of the stable functioning of the information system. Reliability assessment is a complex indicator that consists of four groups of properties, namely: durability, reliability, maintainability and complex indicators. In turn, the reliability properties are composed of indicators of each of the properties. It is on the basis of these indicators that the reliability of the information system used or designed. The stable functioning of information systems largely depends on the reliable operation of technical components of the system, both physical and software. The reasons that suggest an increased interest in the problems of determining the reliability of information systems are: increasing the complexity of the hardware of information systems and the emergence of highperformance information systems; slow growth in the level of reliability of its components; increasing the significance of the hardware work implemented; complexity of the conditions of use, etc. In practice, probabilistic, dynamic, predictive, and static models for determining the reliability of information systems are used to assess reliability. Each of these methods uses the presented reliability indicators as the basis for determining its reliability assessment. The concepts of information system and reliability are presented. Models and methods for determining the reliability of information systems are analysed. Criteria for the development of a formal model of research methods for evaluating the reliability of information systems are defined. A formal model has been developed for the study of methods for determining the reliability of information systems.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125635799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat and Vulnerability Analysis of IoT and IIoT Concepts 物联网和工业物联网概念的威胁和漏洞分析
NBI Technologies Pub Date : 2021-03-01 DOI: 10.15688/nbit.jvolsu.2020.3.5
V. Shevtsov, Nikita Kasimovsky
{"title":"Threat and Vulnerability Analysis of IoT and IIoT Concepts","authors":"V. Shevtsov, Nikita Kasimovsky","doi":"10.15688/nbit.jvolsu.2020.3.5","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.3.5","url":null,"abstract":"IoT and IIoT are new information technologies. They are very efficient solutions for home, industry and infrastructure. A lot of complex processes can be implemented using this systems. The popularity of the industrial Internet of things is steadily growing along with the development of the Internet of things. Both of these approaches involve the exchange of data over the Internet, use of common hardware platforms and are managed by using specialized software, and this leads to an increase in the number of common vulnerabilities and possible attacks on industrial facilities. The Frost & Sullivan report shows that industrial and IT infrastructures are becoming more transparent. First of all, this is due to the development of the Industrial 4.0 standard and the refusal to isolate industrial facilities, which entails common vulnerabilities, the use of security services based on the SaaS model for industrial facilities, as well as the use of hardware devices that a potential attacker can access quite easily. But very actual problems of IoT and IIoT are information security. Many of this systems are critical and little error can stop the entire system. This is not hard for hackers because that complex system has sensitive components usually. For example simple router can have a lot of vulnerabilities. There an attacker takes a root easily in every system. To solve the problem successfully it is recommended to use complex security actions. These are secure configurations of network devices, using safe devices and protocols, regular audit, using backups, using actual politics of information security.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132857349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of the Fine Structure of 5 VMC Niobium Alloy Samples After Internal Nitriding 5种VMC铌合金样品内氮化后微观组织的研究
NBI Technologies Pub Date : 2021-03-01 DOI: 10.15688/nbit.jvolsu.2020.3.6
K. Smirnov
{"title":"Investigation of the Fine Structure of 5 VMC Niobium Alloy Samples After Internal Nitriding","authors":"K. Smirnov","doi":"10.15688/nbit.jvolsu.2020.3.6","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2020.3.6","url":null,"abstract":"The paper considers the possibility of studying the fine structure of samples made of niobium alloy 5 VMC (grade 5B2MC-2), which underwent internal nitriding by X-ray diffraction analysis.The calculation of the dislocation density, which represents one of the parameters of the fine structure using various techniques, is shown. Its influence on the possible modes of internal nitriding is considered.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132207684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of the Types of Radar Absorbing Materials 雷达吸波材料的种类分析
NBI Technologies Pub Date : 2019-10-01 DOI: 10.15688/nbit.jvolsu.2019.2.6
A. Afanasiev, Y. Bakhracheva
{"title":"Analysis of the Types of Radar Absorbing Materials","authors":"A. Afanasiev, Y. Bakhracheva","doi":"10.15688/nbit.jvolsu.2019.2.6","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2019.2.6","url":null,"abstract":"The paper provides the analysis of modern radar absorbing materials. The authors describe the advantage of radar absorbing material on the basis of the metamaterial.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116715850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Linguistic Methods of Informational Impact on Human Consciousness 语言方法对人类意识的信息影响分析
NBI Technologies Pub Date : 2019-10-01 DOI: 10.15688/nbit.jvolsu.2019.2.3
M. Ozhiganova, I. Dergacheva, Anastasija Kalita
{"title":"Analysis of Linguistic Methods of Informational Impact on Human Consciousness","authors":"M. Ozhiganova, I. Dergacheva, Anastasija Kalita","doi":"10.15688/nbit.jvolsu.2019.2.3","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2019.2.3","url":null,"abstract":"Modern mass media give the opportunity to use a variety of technologies of consciousness manipulation, but it is not important in what way or method this manipulation takes place, it is important what information needs to be conveyed to the ideologists of the organization.\u0000\u0000It is fundamentally important that almost every technology of mind manipulation creates its own image of the enemy, which provokes all the cruelty and aggression of terrorist organization members.\u0000\u0000The authors analyze various linguistic methods for detecting information influence on human consciousness. The paper shows that the classical approach to determining the types of speech actions is very convenient. However, this approach almost completely eludes the real semantics of natural language phrases that carry out speech actions, which can be compensated by the method of using content analysis and the use of databases for the information system.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a Model for Managing the Structure of Information Protection Technical Means in State Information Systems 国家信息系统中信息保护技术手段结构的管理模式研究
NBI Technologies Pub Date : 2019-10-01 DOI: 10.15688/nbit.jvolsu.2019.2.1
A. Babenko
{"title":"Developing a Model for Managing the Structure of Information Protection Technical Means in State Information Systems","authors":"A. Babenko","doi":"10.15688/nbit.jvolsu.2019.2.1","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2019.2.1","url":null,"abstract":"The urgency of the issue of information security in state information systems is justified by the high demand for systems of this class. The effectiveness of public information systems largely depends on the level of their security. Based on this, we formulate the purpose of this study: formalization of the process of managing the composition of the system of information technical protection in state information systems.\u0000\u0000The paper deals with the problem of managing the composition of the system of information technical protection in state information systems. The author analyzes threats to information security in state information systems. The article defines the criteria of evaluating technical means of information protection in state information systems. The researcher develops a formal model of managing the structure of information technical protection system in state information systems.\u0000\u0000The developed model of managing the structure of information protection technical means in state information systems allows to determine the most effective structure of the information protection system in state information systems. If the requirements for the analyzed means of information security change, then changing the values in the optimal vector, you can come to the right decision. Consequently, the developed model of managing the structure of information protection technical means in state information systems is universal and effective.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"579 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116067459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polaritons in Nanocomposites of Metal Nanoparticles – Dielectric 金属纳米颗粒纳米复合材料中的极化子-介电介质
NBI Technologies Pub Date : 2019-10-01 DOI: 10.15688/nbit.jvolsu.2019.2.7
V. Yatsyshen, I. Potapova, Vyacheslav Shipaev
{"title":"Polaritons in Nanocomposites of Metal Nanoparticles – Dielectric","authors":"V. Yatsyshen, I. Potapova, Vyacheslav Shipaev","doi":"10.15688/nbit.jvolsu.2019.2.7","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2019.2.7","url":null,"abstract":"The article studies the main characteristics of surface polaritons in composite nanomaterials. The authors consider composite media such as noble metal nanoparticles randomly distributed in a transparent dielectric matrix and build dispersion curves of polaritons in such nanocomposites. The paper shows calculating optical parameters of the surface polariton for several values of the radius of metal nanoparticles and the nanocomposite filling parameter. The authors also present the calculations of the complex refractive index for polaritons in composites with nanoparticles of different metals. In addition, the authors find the dependences of the real and imaginary parts of the complex refractive index of the nanocomposite on the normalized frequency for membranes with different thicknesses and calculate real and imaginary parts of dielectric constant for waves in several metals. Besides, the article provides an overview of important stages in the study of surface electromagnetic waves. It shows that the variation of the structure materials, size and concentration of nanoparticles opens wide possibilities for controlling the optical properties of composite mediums and their practical application. The considered nanocomposites are artificially created media whose material parameters can be controlled. The first method consists in changing the relative volume of the nanoparticles filling of the dielectric matrix. The second method consists in changing the dielectric constant of the nanocomposite matrix. The authors emphasize that the dielectric constant of the nanocomposite in this case acquires resonant properties in contrast to the permeability of the nanoparticles themselves.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121409097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet Fraud as a Threat to Personal Information Security 网络诈骗对个人信息安全的威胁
NBI Technologies Pub Date : 2019-10-01 DOI: 10.15688/nbit.jvolsu.2019.2.4
M. Maslova, Kristina Ryzhaja
{"title":"Internet Fraud as a Threat to Personal Information Security","authors":"M. Maslova, Kristina Ryzhaja","doi":"10.15688/nbit.jvolsu.2019.2.4","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2019.2.4","url":null,"abstract":"The paper analyzes the statistics of implementing known information threats, considers new types of Internet fraud and develops recommendations for protecting against unauthorized actions of Internet scammers.\u0000\u0000Internet fraud has long gone beyond mailing and has become widespread. Fraudsters operate in almost all spheres of human activity, and with the advent of various means of communication their activities have acquired new trends.\u0000\u0000The most common methods of online fraud are the following: fake shops with Internet sales, phishing, fundraising for charity, dating sites, viral content.\u0000\u0000The paper shows that the considered methods of Internet fraud are connected not so much with the Internet as directly with the user. Internet users should not only be aware of possible types and schemes of fraud, but also take care of software protection methods such as antivirus and timely updating all applications, browsers and systems. Only being up to date, constantly learning and being interested in both new threats and methods of their protection users can protect themselves and their loved ones from losses.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117148946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a Software Module to Automate the Process of Categorizing Objects of Critical Information Infrastructure 关键信息基础设施对象自动分类的软件模块开发
NBI Technologies Pub Date : 2019-10-01 DOI: 10.15688/nbit.jvolsu.2019.2.2
J. Goncharenko, A. Golovin
{"title":"Developing a Software Module to Automate the Process of Categorizing Objects of Critical Information Infrastructure","authors":"J. Goncharenko, A. Golovin","doi":"10.15688/nbit.jvolsu.2019.2.2","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2019.2.2","url":null,"abstract":"This article presents a program for automating the process of categorizing critical information infrastructure of the Russian Federation. The program for automating the process of categorizing critical information infrastructure objects is located on Windows 7 that provides consistent, logically verified work. When you run it, the user is given the ability to automatically enter data in the object scope, type, architecture. As a development environment for this software product PyCharm developed by JetBrains based on IntelliJ IDEA was used for Python programming language. The program provides libraries pyqt5, python-docxtemplate’s, pyinstaller. In the end of the program the objects of critical information infrastructure are identified as the outcome of importance (or not given) and create the resulting document in Microsoft Word (.docx). Thus, the developed software module for automating the process of categorizing critical information infrastructure objects allows to speed up the process making it easier to implement.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125200626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信