Bezopasnost informacionnyh tehnology最新文献

筛选
英文 中文
Development of a related key function in ARX stochastic data transformation algorithms ARX随机数据转换算法中一个相关关键函数的开发
Bezopasnost informacionnyh tehnology Pub Date : 2021-12-01 DOI: 10.26583/bit.2021.4.05
Alexander A. Kozlov
{"title":"Development of a related key function in ARX stochastic data transformation algorithms","authors":"Alexander A. Kozlov","doi":"10.26583/bit.2021.4.05","DOIUrl":"https://doi.org/10.26583/bit.2021.4.05","url":null,"abstract":". In this paper an analysis of ARX stochastic algorithms based on related keys is considered. Analysis based on this approach is carried out using the selected open text and the keys linked by some function. A special case of using related keys is the analysis of an algorithm consisting only of the operations of modular addition modulo 2 n , modulo 2, and cyclic shift. Such algorithms are so-called ARX stochastic algorithms. The common method of analysing the algorithms based on related keys is the rotation analysis method. This method allows formulating requirements only for the number of addition operations modulo 2 n . The considered properties of the rotation analysis method demonstrated the need to develop requirements for ARX algorithms in terms of the number of cyclic shift operations. Based on the properties of the mathematical operations used in the ARX stochastic algorithms, a non-cyclic related key function was proposed. Among ARX operations, only the cyclic shift function affects the probability of such relation. The complexity of the analysis based on non-cyclic related key function has been estimated. It is proved that the complexity of relation key analysis of ARX algorithms is determined by the","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130886329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network covert channels capacity limitation by adding random delays before packet sending 通过在数据包发送前添加随机延迟来限制网络隐蔽信道的容量
Bezopasnost informacionnyh tehnology Pub Date : 2021-12-01 DOI: 10.26583/bit.2021.4.06
A. Belozubova, K. Kogos, Philipp V. Lebedev
{"title":"Network covert channels capacity limitation by adding random delays before packet sending","authors":"A. Belozubova, K. Kogos, Philipp V. Lebedev","doi":"10.26583/bit.2021.4.06","DOIUrl":"https://doi.org/10.26583/bit.2021.4.06","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114142292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Method for analysis of the stability of nuclear power plant systems to the impact of computer attacks 核电厂系统稳定性对计算机攻击影响的分析方法
Bezopasnost informacionnyh tehnology Pub Date : 2021-12-01 DOI: 10.26583/bit.2021.4.04
Vitaliy G. Vanenko, N. D. Ivanova
{"title":"Method for analysis of the stability of nuclear power plant systems to the impact of computer attacks","authors":"Vitaliy G. Vanenko, N. D. Ivanova","doi":"10.26583/bit.2021.4.04","DOIUrl":"https://doi.org/10.26583/bit.2021.4.04","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129871540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Method for creating a trusted hardware-software platform for its application in special purpose information systems 一种用于专用信息系统的可信软硬件平台的创建方法
Bezopasnost informacionnyh tehnology Pub Date : 2021-12-01 DOI: 10.26583/bit.2021.4.08
A. Y. Borovikov, Oleg A. Maslov, Stepan A. Mordvinov, Andrey A. Esafiev
{"title":"The Method for creating a trusted hardware-software platform for its application in special purpose information systems","authors":"A. Y. Borovikov, Oleg A. Maslov, Stepan A. Mordvinov, Andrey A. Esafiev","doi":"10.26583/bit.2021.4.08","DOIUrl":"https://doi.org/10.26583/bit.2021.4.08","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123962288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectrogram image encoding to provide variable audio data rates and preserve its sound quality 频谱图图像编码,以提供可变的音频数据率,并保持其音质
Bezopasnost informacionnyh tehnology Pub Date : 2021-12-01 DOI: 10.26583/bit.2021.4.02
S. Dvoryankin, A. E. Zenov, Roman A. Ustinov, Nikita S. Dvoryankin
{"title":"Spectrogram image encoding to provide variable audio data rates and preserve its sound quality","authors":"S. Dvoryankin, A. E. Zenov, Roman A. Ustinov, Nikita S. Dvoryankin","doi":"10.26583/bit.2021.4.02","DOIUrl":"https://doi.org/10.26583/bit.2021.4.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130117918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The use of polar harmonic transformations in the development of methods for robust image watermarking 利用极调和变换开发鲁棒图像水印方法
Bezopasnost informacionnyh tehnology Pub Date : 2021-12-01 DOI: 10.26583/bit.2021.4.07
A. N. Shniperov, Valeriy A. Melnikov
{"title":"The use of polar harmonic transformations in the development of methods for robust image watermarking","authors":"A. N. Shniperov, Valeriy A. Melnikov","doi":"10.26583/bit.2021.4.07","DOIUrl":"https://doi.org/10.26583/bit.2021.4.07","url":null,"abstract":". The need for developing a robust image watermarking method remains relevant. This is caused by the fact that existing watermarking methods are either not robust enough to various types of attacks on images, or computationally complex, or they are subject to the so-called numerical instability, i.e., accumulation of errors. This paper proposes the use of polar harmonic transformations as the basis of the method for image watermarking, including algorithms for embedding and extracting a watermark, and methods for multiple marking are proposed: multiple embedding and extracting by majority rule, multiple embedding and extracting according to the rule of greater similarity, embedding and extracting fragments of a watermark. The performance characteristics, such as robustness to various attacks, embedding and extraction time for a fixed area size, and maximum size of watermark, are measured using attacks implemented in StirMark BenchMark 4. The proposed method has been proven to be robust to many types of geometric attacks, JPEG-compression and other attacks, to have a high embedding and extraction rate, and to be numerically stable. The proposed method can be used to watermark JPEG images for copyright protection.","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127097637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving machine learning based on secure two-party computations 基于安全两方计算的隐私保护机器学习
Bezopasnost informacionnyh tehnology Pub Date : 2021-12-01 DOI: 10.26583/bit.2021.4.03
S. Zapechnikov, A. Shcherbakov
{"title":"Privacy-preserving machine learning based on secure two-party computations","authors":"S. Zapechnikov, A. Shcherbakov","doi":"10.26583/bit.2021.4.03","DOIUrl":"https://doi.org/10.26583/bit.2021.4.03","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127590581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Сonvolutional neural networks in the diagnosis of skin neoplasms Сonvolutional神经网络在皮肤肿瘤诊断中的应用
Bezopasnost informacionnyh tehnology Pub Date : 2021-12-01 DOI: 10.26583/bit.2021.4.09
V. G. Nikitaev, A. Pronichev, O. Tamrazova, V. Sergeev, Y. Sergeev, Dmitry V. Gurov, S. M. Zaitsev, M. Solomatin, T. P. Zanegina, Vladimir S. Vladimir S. Kozlov
{"title":"Сonvolutional neural networks in the diagnosis of skin neoplasms","authors":"V. G. Nikitaev, A. Pronichev, O. Tamrazova, V. Sergeev, Y. Sergeev, Dmitry V. Gurov, S. M. Zaitsev, M. Solomatin, T. P. Zanegina, Vladimir S. Vladimir S. Kozlov","doi":"10.26583/bit.2021.4.09","DOIUrl":"https://doi.org/10.26583/bit.2021.4.09","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125894775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topical issues of creating a mass education system for information security culture 建立大众资讯保安文化教育体系的议题
Bezopasnost informacionnyh tehnology Pub Date : 2021-12-01 DOI: 10.26583/bit.2021.4.01
A. Malyuk, Zoya P. Malyuk
{"title":"Topical issues of creating a mass education system for information security culture","authors":"A. Malyuk, Zoya P. Malyuk","doi":"10.26583/bit.2021.4.01","DOIUrl":"https://doi.org/10.26583/bit.2021.4.01","url":null,"abstract":". The rapidly developing processes of the information society formation in Russia put on the agenda the problem of improving the information culture of society and, above all, such a part of it as the culture of information security. The practice demonstrates a need in organising an effective \"universal education\" in the field of information protection for modern technical means of its collection, processing, transmission and storage. The Information Security Doctrine of the Russian Federation, approved by the President of the country in December 2016, repeatedly notes the importance of the problem of forming a culture of personal information security of citizens who are, in particular, active users of the Internet and other modern information and communication systems. In this regard, the article deals with topical issues of the formation of a system of continuous training of members of the information society in the field of the basics of information security, starting from the earliest years (from school or even from kindergarten). The paper describes the policy of forming a culture of information security, formulates approaches to the organisation of mass education systems, and suggests specific measures for their implementation. As an example of the progress in this direction, an innovative educational cluster created by a joint decision of the Ministry of Digital Development, Communications and Mass Media of the Russian Federation and the Department of Education and Science of Moscow is described.","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128644076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mathematical model of the formation of a unified information space of the radio-electronic industry 无线电电子工业统一信息空间形成的数学模型
Bezopasnost informacionnyh tehnology Pub Date : 2021-12-01 DOI: 10.26583/bit.2021.4.10
Anatoliy A. Chuprinov
{"title":"Mathematical model of the formation of a unified information space of the radio-electronic industry","authors":"Anatoliy A. Chuprinov","doi":"10.26583/bit.2021.4.10","DOIUrl":"https://doi.org/10.26583/bit.2021.4.10","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128505785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信