Pavel V. Nekrasov, Alexander M. Zharikov, D.A Kozin
{"title":"Managing wireless communication security for smart home cyber-physical systems","authors":"Pavel V. Nekrasov, Alexander M. Zharikov, D.A Kozin","doi":"10.26583/bit.2024.1.02","DOIUrl":"https://doi.org/10.26583/bit.2024.1.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"377 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140275233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring feature set for building a digital user profile of remote connections (based on firewall data)","authors":"Aleksandr Y. Dubinin","doi":"10.26583/bit.2024.1.07","DOIUrl":"https://doi.org/10.26583/bit.2024.1.07","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Gorbatov, I. Zhukov, Vladislav V. Kravchenko, D. Pravikov
{"title":"Technological platform for the implementation of the cybersecurity network concept (\"Cybersecurity Mesh\")","authors":"V. Gorbatov, I. Zhukov, Vladislav V. Kravchenko, D. Pravikov","doi":"10.26583/bit.2023.4.01","DOIUrl":"https://doi.org/10.26583/bit.2023.4.01","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":" March","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138611127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concepts and criteria for assessing the technological independence and security of critical information infrastructure facilities","authors":"B. N. Krivoshein, Ivan A. Pokrovsky","doi":"10.26583/bit.2023.4.02","DOIUrl":"https://doi.org/10.26583/bit.2023.4.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"5 20","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138625555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Skryl', Anastasiya A. Itskova, Evgeny V. Khasin
{"title":"The possibility of improving procedures for quantitative threat assessment of unauthorized access to information of critical information infrastructure facilities","authors":"S. Skryl', Anastasiya A. Itskova, Evgeny V. Khasin","doi":"10.26583/bit.2023.4.03","DOIUrl":"https://doi.org/10.26583/bit.2023.4.03","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"22 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138627042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal choice of information security in automated systems via Markov cyber-attack models","authors":"E. Trapeznikov","doi":"10.26583/bit.2023.4.06","DOIUrl":"https://doi.org/10.26583/bit.2023.4.06","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":" 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138612788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dmitry O. Petrov, Viktor V. Busliuk, Stanislav S. Derechennik, Viktor A. Emeljanov
{"title":"Noise diodes as a source of entropy for hardware random number generators","authors":"Dmitry O. Petrov, Viktor V. Busliuk, Stanislav S. Derechennik, Viktor A. Emeljanov","doi":"10.26583/bit.2023.4.09","DOIUrl":"https://doi.org/10.26583/bit.2023.4.09","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":" 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138616730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Rogovaia, D.S. Kostyuchenko, Ilya O. Loskutov, A. Ulanova
{"title":"Operating System Influence on VLSI Radiation Resistance","authors":"M. A. Rogovaia, D.S. Kostyuchenko, Ilya O. Loskutov, A. Ulanova","doi":"10.26583/bit.2023.4.08","DOIUrl":"https://doi.org/10.26583/bit.2023.4.08","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"61 3‐4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138623682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Sotskov, Alexey V. Zubakov, Nikolay A. Usachev, Alexander V. Ermakov, A. Y. Nikiforov
{"title":"The Trusted UHF Receiver for Radio Frequency Identification of Critical Infrastructure Objects","authors":"D. Sotskov, Alexey V. Zubakov, Nikolay A. Usachev, Alexander V. Ermakov, A. Y. Nikiforov","doi":"10.26583/bit.2023.4.07","DOIUrl":"https://doi.org/10.26583/bit.2023.4.07","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":" 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138617849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trusted and controlled design route complex-functional VLSI using foreign and domestic CAD systems","authors":"Sergey G. Bobkov, B. E. Evlampiev","doi":"10.26583/bit.2023.4.05","DOIUrl":"https://doi.org/10.26583/bit.2023.4.05","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"112 49","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138608543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}