{"title":"Applying of Recurrent and Convolutional Neural Networks for Anomaly Detection of Industrial Process","authors":"A. N. Sokolov, S. Alabugin, I. Pyatnitsky","doi":"10.14529/secur190209","DOIUrl":"https://doi.org/10.14529/secur190209","url":null,"abstract":"","PeriodicalId":314059,"journal":{"name":"Journal of the Ural Federal District Information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125915721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Difficulties in conducting an information security audit in an enterprise","authors":"I. Barankova, U. Mikhailova, T. V. Bykova","doi":"10.14529/secur190108","DOIUrl":"https://doi.org/10.14529/secur190108","url":null,"abstract":"","PeriodicalId":314059,"journal":{"name":"Journal of the Ural Federal District Information security","volume":"23 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132937679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Culture of information security enterprise: comparative analysis of for-eign and russian research","authors":"L. Astakhova, S. Lushnikova","doi":"10.14529/secur190106","DOIUrl":"https://doi.org/10.14529/secur190106","url":null,"abstract":"","PeriodicalId":314059,"journal":{"name":"Journal of the Ural Federal District Information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115689081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acoustic information leakage channel by modulating visible light","authors":"B. Shvyrev, D. A. Timonov","doi":"10.14529/secur190102","DOIUrl":"https://doi.org/10.14529/secur190102","url":null,"abstract":"","PeriodicalId":314059,"journal":{"name":"Journal of the Ural Federal District Information security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122554537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Kartashevskiy, Samara L.Tolstogo st Informatics, I. Pozdnyak
{"title":"Filtering observed traffic as a method of intrusion detection","authors":"V. Kartashevskiy, Samara L.Tolstogo st Informatics, I. Pozdnyak","doi":"10.14529/secur190103","DOIUrl":"https://doi.org/10.14529/secur190103","url":null,"abstract":"","PeriodicalId":314059,"journal":{"name":"Journal of the Ural Federal District Information security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. P. Belov, «E-soft» Ltd. а, Tyumen Russia let Pobedy St., I. Zulkarneev, R. V. Kramarenko, I. Pelevin, «E-soft» Ltd. а Server interfaces specialist
{"title":"Providing fault tolerance for microservice architectures in Kubernetes, the container orchestration engine","authors":"D. P. Belov, «E-soft» Ltd. а, Tyumen Russia let Pobedy St., I. Zulkarneev, R. V. Kramarenko, I. Pelevin, «E-soft» Ltd. а Server interfaces specialist","doi":"10.14529/secur190201","DOIUrl":"https://doi.org/10.14529/secur190201","url":null,"abstract":"","PeriodicalId":314059,"journal":{"name":"Journal of the Ural Federal District Information security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125373159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Barankova, M. V. Konovalov, O. Permyakova, M. A. Permyakova, student Bld. Lenina Ave Magnitogorsk Russia Nmstu
{"title":"Security system project development of the apcs as a significant object of the critical information infrastructure","authors":"I. Barankova, M. V. Konovalov, O. Permyakova, M. A. Permyakova, student Bld. Lenina Ave Magnitogorsk Russia Nmstu","doi":"10.14529/secur190105","DOIUrl":"https://doi.org/10.14529/secur190105","url":null,"abstract":"","PeriodicalId":314059,"journal":{"name":"Journal of the Ural Federal District Information security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116000360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Meeting the requirements for information security of transport enterprises as subjects of critical information infrastructure","authors":"A. A. Zavedenskaya, T. Y. Zyryanova","doi":"10.14529/secur190107","DOIUrl":"https://doi.org/10.14529/secur190107","url":null,"abstract":"","PeriodicalId":314059,"journal":{"name":"Journal of the Ural Federal District Information security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127474965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation negative processes impact model on automated process control systems and counteractions them by the safety systems","authors":"V. Moskovchenko, A. Shilina, A. A. Gaydarevsky","doi":"10.14529/secur190111","DOIUrl":"https://doi.org/10.14529/secur190111","url":null,"abstract":"","PeriodicalId":314059,"journal":{"name":"Journal of the Ural Federal District Information security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The combination of the lattice theory problem and the number theory problem in the authentication schemes, algorithms and protocols","authors":"A. Komarova, S. P. R. Optics., A. Korobeynikov","doi":"10.14529/secur190203","DOIUrl":"https://doi.org/10.14529/secur190203","url":null,"abstract":"","PeriodicalId":314059,"journal":{"name":"Journal of the Ural Federal District Information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125850325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}