V. Gorbatov, I. Zhukov, Vladislav V. Kravchenko, D. Pravikov
{"title":"Cybersecurity of the network perimeter of the critical information infrastructure object","authors":"V. Gorbatov, I. Zhukov, Vladislav V. Kravchenko, D. Pravikov","doi":"10.26583/bit.2022.4.02","DOIUrl":"https://doi.org/10.26583/bit.2022.4.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128860129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THERE IS AN OPINION: \"What could be the program for creating domestic CAD systems?\"","authors":"Maxim S. Gorbunov, I. A. Danilov","doi":"10.26583/bit.2022.3.01","DOIUrl":"https://doi.org/10.26583/bit.2022.3.01","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115431323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodological aspects of penetration testing automation for significant objects of critical information infrastructure","authors":"V. Gorbatov, D. Dyatlov, Aleksander N. Ryzhikov","doi":"10.26583/bit.2022.3.08","DOIUrl":"https://doi.org/10.26583/bit.2022.3.08","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128738426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods of image transformation for person authentication using face thermographic image","authors":"N.I. Belov","doi":"10.26583/bit.2022.3.04","DOIUrl":"https://doi.org/10.26583/bit.2022.3.04","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115096409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Socio-psychological techniques of information warfare","authors":"A. Malyuk","doi":"10.26583/bit.2022.3.02","DOIUrl":"https://doi.org/10.26583/bit.2022.3.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130686968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alеksеy S. Gеraskin, Anastasia A. Shulikina, A. Lukyanova
{"title":"Investigating the possibility of increasing the resilience to attack of the differential energy watermarking embedding method","authors":"Alеksеy S. Gеraskin, Anastasia A. Shulikina, A. Lukyanova","doi":"10.26583/bit.2022.3.06","DOIUrl":"https://doi.org/10.26583/bit.2022.3.06","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125808557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the application of the vulnerability analysis method of the technological process of the production facility to ensure the information security of the automated process control system, taking into account the interrelation of components","authors":"A. S. Mosolov, A. Krasnov, Nikolay A. Urban","doi":"10.26583/bit.2022.3.03","DOIUrl":"https://doi.org/10.26583/bit.2022.3.03","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"724 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131205780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hiding data in blocks of Oracle Database","authors":"M. Kupriyashin, Regina F. Baiazitova","doi":"10.26583/bit.2022.3.05","DOIUrl":"https://doi.org/10.26583/bit.2022.3.05","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131385881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Artem O. Kalinkin, Svetlana A. Golub, Igor Korkin, Danil N. Pyatovskiy
{"title":"Ransomware detection based on machine learning models and Event Tracing for Windows","authors":"Artem O. Kalinkin, Svetlana A. Golub, Igor Korkin, Danil N. Pyatovskiy","doi":"10.26583/bit.2022.3.07","DOIUrl":"https://doi.org/10.26583/bit.2022.3.07","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121367457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving functional reliability of biometric identification systems by introducing redundancy","authors":"V. G. Ivanenko, N. D. Ivanova, Aleksey G. Sabanov","doi":"10.26583/bit.2022.2.03","DOIUrl":"https://doi.org/10.26583/bit.2022.2.03","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131629003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}