S. Skryl', P. Fedyunin, Tatyana V. Meshcheryakova, Ruslan A. Khvorov
{"title":"Substantiation of the indicator for assessing the manageability of information security in automated control systems of critical applications from the effects of malicious software","authors":"S. Skryl', P. Fedyunin, Tatyana V. Meshcheryakova, Ruslan A. Khvorov","doi":"10.26583/bit.2024.2.01","DOIUrl":"https://doi.org/10.26583/bit.2024.2.01","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"180 S468","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141413147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vladlen D. Afonin, S. Zapechnikov, Igor A. Prostov
{"title":"GOST 34.11-2018 Analysis in The Context of Zero-Knowledge Proofs","authors":"Vladlen D. Afonin, S. Zapechnikov, Igor A. Prostov","doi":"10.26583/bit.2024.2.05","DOIUrl":"https://doi.org/10.26583/bit.2024.2.05","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"480 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141401539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithm obtaining invariants","authors":"Yurii L. Zachesov, I. M. Yadykin","doi":"10.26583/bit.2024.2.04","DOIUrl":"https://doi.org/10.26583/bit.2024.2.04","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"2 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141394492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Configurable ring oscillator with controlled interconnections","authors":"A. A. Ivaniuk, V. N. Yarmolik","doi":"10.26583/bit.2024.2.08","DOIUrl":"https://doi.org/10.26583/bit.2024.2.08","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"22 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141404404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vladislav V. Zholondkovskiy, Yuri I. Bocharov, Vladimir A. Butuzov
{"title":"Neural network device for recognizing speech commands based on hardware accelerators of the NEUROMATRIX family","authors":"Vladislav V. Zholondkovskiy, Yuri I. Bocharov, Vladimir A. Butuzov","doi":"10.26583/bit.2024.2.09","DOIUrl":"https://doi.org/10.26583/bit.2024.2.09","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"238 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141412933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Igor I. Korchagin, Ksenia E. Amelina, Alexander N. Stadnik, Anton O. Karetskiy, Valeriy S. Antonov
{"title":"A formalized representation of the target function of the impact of malicious software on the operating environment of a special-purpose automated control system","authors":"Igor I. Korchagin, Ksenia E. Amelina, Alexander N. Stadnik, Anton O. Karetskiy, Valeriy S. Antonov","doi":"10.26583/bit.2024.2.02","DOIUrl":"https://doi.org/10.26583/bit.2024.2.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"4 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141392592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Sotskov, Vladislav N. Kotov, Alexey V. Zubakov, Nikolay A. Usachev, A. Y. Nikiforov, Dmitry V. Boychenko
{"title":"The Design Technique for Power Management Unit of the Tag IC for Radio Frequency Identification of Critical Infrastructure Objects","authors":"D. Sotskov, Vladislav N. Kotov, Alexey V. Zubakov, Nikolay A. Usachev, A. Y. Nikiforov, Dmitry V. Boychenko","doi":"10.26583/bit.2024.2.10","DOIUrl":"https://doi.org/10.26583/bit.2024.2.10","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"34 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141412479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The methodology of analysis and assessment of the level of security of the software used at the objects of informatization of internal affairs bodies","authors":"Arina D. Popova, I. Drovnikova","doi":"10.26583/bit.2024.2.03","DOIUrl":"https://doi.org/10.26583/bit.2024.2.03","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"44 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141406767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Problems of floating vulnerabilities in ensuring mobile application security","authors":"Anton S. Cherevan, Alexey P. Lapsar","doi":"10.26583/bit.2024.2.07","DOIUrl":"https://doi.org/10.26583/bit.2024.2.07","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"3 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141394244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}