AUTOMATIC CONTROL AND COMPUTER SCIENCES最新文献

筛选
英文 中文
Decimation of M Sequences As a Way of Obtaining Primitive Polynomials 作为获取原始多项式的一种方法对 M 序列进行十进制处理
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080138
D. V. Kushnir, S. N. Shemyakin
{"title":"Decimation of M Sequences As a Way of Obtaining Primitive Polynomials","authors":"D. V. Kushnir,&nbsp;S. N. Shemyakin","doi":"10.3103/S0146411623080138","DOIUrl":"10.3103/S0146411623080138","url":null,"abstract":"<p>One approach to obtain a cryptographically strong encryption gamma is to use linear-feedback shift registers defined by primitive polynomials. The ability to quickly select the appropriate polynomial can provide the required degree of security of the stream cipher. Currently, primitive polynomials for sufficiently large degrees are known, but usually these are so-called sparse polynomials. To increase the correlational stability, it is necessary to be able to quickly generate new primitive polynomials of the given degrees, which is the focus of this study.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"928 - 932"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering 检测对协同过滤推荐系统的操纵攻击的方法
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080047
A. D. Dakhnovich, D. S. Zagalsky, R. S. Solovey
{"title":"Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering","authors":"A. D. Dakhnovich,&nbsp;D. S. Zagalsky,&nbsp;R. S. Solovey","doi":"10.3103/S0146411623080047","DOIUrl":"10.3103/S0146411623080047","url":null,"abstract":"<p>The security of recommendation systems with collaborative filtering from manipulation attacks is considered. The most common types of attacks are analyzed and identified. A modified method for detecting manipulation attacks on recommendation systems with collaborative filtering is proposed. Experimental testing and a comparison of the effectiveness of the modified method with other current methods are carried out.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"868 - 874"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142414910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet 比特币核心加密钱包的加密保护分析
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080278
P. V. Semyanov, S. V. Grezina
{"title":"Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet","authors":"P. V. Semyanov,&nbsp;S. V. Grezina","doi":"10.3103/S0146411623080278","DOIUrl":"10.3103/S0146411623080278","url":null,"abstract":"<p>This article discusses the security of implementing encryption for the Bitcoin Core cryptocurrency wallet. Particular attention is paid to aspects of the practical use of cryptographic algorithms when encrypting the wallet.dat file with a password. Practical resistance to brute-force attacks using parallel computing on GPUs is also considered. It is discovered that Bitcoin Core does not implement changing the encryption key for the user’s private keys. This implementation makes it possible to carry out a second attack on the wallet without knowing the new password, if it has already been compromised previously. Changes to encryption algorithms are also been proposed to make brute-force attacks more difficult on the GPU.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"914 - 921"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology 针对具有自适应拓扑的不同类型网络的基于图的自调节功能
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080217
E. Yu. Pavlenko, M. A. Pakhomov
{"title":"Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology","authors":"E. Yu. Pavlenko,&nbsp;M. A. Pakhomov","doi":"10.3103/S0146411623080217","DOIUrl":"10.3103/S0146411623080217","url":null,"abstract":"<p>This article presents graph theory-based approaches to self-regulation of networks with adaptive network topology. These approaches are limited to networks with no node mobility—peer-to-peer and heterogeneous sensor networks, as well as industrial networks on the example of Smart Grid smart energy consumption networks. For each network type, a generalized target function is described, conditions for self-regulation are formulated, and a formal description of the process of self-regulation is provided.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1055 - 1062"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Features of Detecting Malicious Installation Files Using Machine Learning Algorithms 使用机器学习算法检测恶意安装文件的特点
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080333
P. E. Yugai, E. V. Zhukovskii, P. O. Semenov
{"title":"Features of Detecting Malicious Installation Files Using Machine Learning Algorithms","authors":"P. E. Yugai,&nbsp;E. V. Zhukovskii,&nbsp;P. O. Semenov","doi":"10.3103/S0146411623080333","DOIUrl":"10.3103/S0146411623080333","url":null,"abstract":"<p>This paper presents a study of the possibility of using machine learning methods to detect malicious installation files related to the type of Trojan installers and downloaders. A comparative analysis of machine learning algorithms applicable for the solution of this problem is provided: the naive Bayes classifier (NBC), random forest, and C4.5 algorithm. Machine learning models are developed using the Weka software. The most significant attributes of installation files of legitimate and Trojan programs are highlighted.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"968 - 974"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity 一种基于切断多余网络连接确保网络基础设施安全的网络访问控制方法
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080308
A. D. Shilova, A. A. Vorob’eva
{"title":"A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity","authors":"A. D. Shilova,&nbsp;A. A. Vorob’eva","doi":"10.3103/S0146411623080308","DOIUrl":"10.3103/S0146411623080308","url":null,"abstract":"<p>This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on severing superfluous network connectivity between subjects and objects is proposed and assessed; and potential directions of its development are outlined. This method can be used for network segmentation.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1116 - 1125"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140889943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection of Computational Machine Learning Models against Extraction Threat 保护计算机器学习模型免受提取威胁
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080084
M. O. Kalinin, M. D. Soshnev, A. S. Konoplev
{"title":"Protection of Computational Machine Learning Models against Extraction Threat","authors":"M. O. Kalinin,&nbsp;M. D. Soshnev,&nbsp;A. S. Konoplev","doi":"10.3103/S0146411623080084","DOIUrl":"10.3103/S0146411623080084","url":null,"abstract":"<p>The extraction threat to machine learning models is considered. Most contemporary methods of defense against the extraction of computational machine learning models are based on the use of a protective noise mechanism. The main disadvantage inherent in the noise mechanism is that it reduces the precision of the model’s output. The requirements for the efficient methods of protecting the machine learning models from extraction are formulated, and a new method of defense against this threat, supplementing the noise with a distillation mechanism, is presented. It is experimentally shown that the developed method provides the resistance of machine learning models to extraction threat while maintaining the quality their operating results due to the transformation of protected models into the other simplified models equivalent to the original ones.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"996 - 1004"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability Analysis of the Architecture of Messaging Systems with a Decentralized Node Structure 具有分散节点结构的信息传递系统架构的稳定性分析
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080205
E. M. Orel, D. A. Moskvin, I. A. Anoshkin
{"title":"Stability Analysis of the Architecture of Messaging Systems with a Decentralized Node Structure","authors":"E. M. Orel,&nbsp;D. A. Moskvin,&nbsp;I. A. Anoshkin","doi":"10.3103/S0146411623080205","DOIUrl":"10.3103/S0146411623080205","url":null,"abstract":"<p>The results of an architecture stability analysis of messaging systems with a decentralized node structure Briar and Bridgefy are presented. Mathematical models of target systems are developed and protocols for generating keys, establishing connections, and transferring data between the systems’ users are described. The key features of the architecture of messaging systems with a decentralized nodal structure are highlighted. The main classes of threats to target systems are given.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1033 - 1039"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation 基于样本细分提高信息安全状态识别质量
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080321
M. E. Sukhoparov, I. S. Lebedev
{"title":"Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation","authors":"M. E. Sukhoparov,&nbsp;I. S. Lebedev","doi":"10.3103/S0146411623080321","DOIUrl":"10.3103/S0146411623080321","url":null,"abstract":"<p>Increasing the quality indicators for identifying the information security (IS) state of individual segments of cyber-physical systems is related to processing large information arrays. A method for improving quality indicators when solving problems of identifying the IS state is proposed. Its implementation is based on the formation of individual sample segments. Analysis of the properties of these segments makes it possible to select and assign algorithms that have the best quality indicators in the current segment. Segmentation of a data sample is considered. Using real dataset data as an example, experimental values of the quality indicator for the proposed method are given for various classifiers on individual segments and the entire sample.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1071 - 1075"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols 后量子密码学协议同源图结构研究
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080102
S. O. Kostin, E. B. Aleksandrova
{"title":"Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols","authors":"S. O. Kostin,&nbsp;E. B. Aleksandrova","doi":"10.3103/S0146411623080102","DOIUrl":"10.3103/S0146411623080102","url":null,"abstract":"<p>The isogeny graphs of supersingular curves are one of the promising mathematical structures in postquantum cryptography algorithms. However, the recently reported attack on the SIDH protocol [1] demonstrates that the isogeny graphs require a more detailed investigation when applied to real protocols. In this study, we analyze the structure of the graphs of isogenies of degree <span>(ell &gt; 2)</span> and consider the set of vertices of a special type to which an attack on reconstruction of the path in the graph is applicable [7].</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"904 - 913"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信