AUTOMATIC CONTROL AND COMPUTER SCIENCES最新文献

筛选
英文 中文
Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology 针对具有自适应拓扑的不同类型网络的基于图的自调节功能
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080217
E. Yu. Pavlenko, M. A. Pakhomov
{"title":"Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology","authors":"E. Yu. Pavlenko,&nbsp;M. A. Pakhomov","doi":"10.3103/S0146411623080217","DOIUrl":"10.3103/S0146411623080217","url":null,"abstract":"<p>This article presents graph theory-based approaches to self-regulation of networks with adaptive network topology. These approaches are limited to networks with no node mobility—peer-to-peer and heterogeneous sensor networks, as well as industrial networks on the example of Smart Grid smart energy consumption networks. For each network type, a generalized target function is described, conditions for self-regulation are formulated, and a formal description of the process of self-regulation is provided.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1055 - 1062"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Features of Detecting Malicious Installation Files Using Machine Learning Algorithms 使用机器学习算法检测恶意安装文件的特点
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080333
P. E. Yugai, E. V. Zhukovskii, P. O. Semenov
{"title":"Features of Detecting Malicious Installation Files Using Machine Learning Algorithms","authors":"P. E. Yugai,&nbsp;E. V. Zhukovskii,&nbsp;P. O. Semenov","doi":"10.3103/S0146411623080333","DOIUrl":"10.3103/S0146411623080333","url":null,"abstract":"<p>This paper presents a study of the possibility of using machine learning methods to detect malicious installation files related to the type of Trojan installers and downloaders. A comparative analysis of machine learning algorithms applicable for the solution of this problem is provided: the naive Bayes classifier (NBC), random forest, and C4.5 algorithm. Machine learning models are developed using the Weka software. The most significant attributes of installation files of legitimate and Trojan programs are highlighted.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"968 - 974"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity 一种基于切断多余网络连接确保网络基础设施安全的网络访问控制方法
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080308
A. D. Shilova, A. A. Vorob’eva
{"title":"A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity","authors":"A. D. Shilova,&nbsp;A. A. Vorob’eva","doi":"10.3103/S0146411623080308","DOIUrl":"10.3103/S0146411623080308","url":null,"abstract":"<p>This paper discusses problems of improving network infrastructure security. A network infrastructure is developed; an access control method based on severing superfluous network connectivity between subjects and objects is proposed and assessed; and potential directions of its development are outlined. This method can be used for network segmentation.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1116 - 1125"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140889943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection of Computational Machine Learning Models against Extraction Threat 保护计算机器学习模型免受提取威胁
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080084
M. O. Kalinin, M. D. Soshnev, A. S. Konoplev
{"title":"Protection of Computational Machine Learning Models against Extraction Threat","authors":"M. O. Kalinin,&nbsp;M. D. Soshnev,&nbsp;A. S. Konoplev","doi":"10.3103/S0146411623080084","DOIUrl":"10.3103/S0146411623080084","url":null,"abstract":"<p>The extraction threat to machine learning models is considered. Most contemporary methods of defense against the extraction of computational machine learning models are based on the use of a protective noise mechanism. The main disadvantage inherent in the noise mechanism is that it reduces the precision of the model’s output. The requirements for the efficient methods of protecting the machine learning models from extraction are formulated, and a new method of defense against this threat, supplementing the noise with a distillation mechanism, is presented. It is experimentally shown that the developed method provides the resistance of machine learning models to extraction threat while maintaining the quality their operating results due to the transformation of protected models into the other simplified models equivalent to the original ones.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"996 - 1004"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability Analysis of the Architecture of Messaging Systems with a Decentralized Node Structure 具有分散节点结构的信息传递系统架构的稳定性分析
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080205
E. M. Orel, D. A. Moskvin, I. A. Anoshkin
{"title":"Stability Analysis of the Architecture of Messaging Systems with a Decentralized Node Structure","authors":"E. M. Orel,&nbsp;D. A. Moskvin,&nbsp;I. A. Anoshkin","doi":"10.3103/S0146411623080205","DOIUrl":"10.3103/S0146411623080205","url":null,"abstract":"<p>The results of an architecture stability analysis of messaging systems with a decentralized node structure Briar and Bridgefy are presented. Mathematical models of target systems are developed and protocols for generating keys, establishing connections, and transferring data between the systems’ users are described. The key features of the architecture of messaging systems with a decentralized nodal structure are highlighted. The main classes of threats to target systems are given.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1033 - 1039"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation 基于样本细分提高信息安全状态识别质量
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080321
M. E. Sukhoparov, I. S. Lebedev
{"title":"Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation","authors":"M. E. Sukhoparov,&nbsp;I. S. Lebedev","doi":"10.3103/S0146411623080321","DOIUrl":"10.3103/S0146411623080321","url":null,"abstract":"<p>Increasing the quality indicators for identifying the information security (IS) state of individual segments of cyber-physical systems is related to processing large information arrays. A method for improving quality indicators when solving problems of identifying the IS state is proposed. Its implementation is based on the formation of individual sample segments. Analysis of the properties of these segments makes it possible to select and assign algorithms that have the best quality indicators in the current segment. Segmentation of a data sample is considered. Using real dataset data as an example, experimental values of the quality indicator for the proposed method are given for various classifiers on individual segments and the entire sample.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1071 - 1075"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols 后量子密码学协议同源图结构研究
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080102
S. O. Kostin, E. B. Aleksandrova
{"title":"Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols","authors":"S. O. Kostin,&nbsp;E. B. Aleksandrova","doi":"10.3103/S0146411623080102","DOIUrl":"10.3103/S0146411623080102","url":null,"abstract":"<p>The isogeny graphs of supersingular curves are one of the promising mathematical structures in postquantum cryptography algorithms. However, the recently reported attack on the SIDH protocol [1] demonstrates that the isogeny graphs require a more detailed investigation when applied to real protocols. In this study, we analyze the structure of the graphs of isogenies of degree <span>(ell &gt; 2)</span> and consider the set of vertices of a special type to which an attack on reconstruction of the path in the graph is applicable [7].</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"904 - 913"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods 用后量子密码学方法提高多代理信息安全系统的效率
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080035
S. V. Bezzateev, S. G. Fomicheva, A. F. Suprun
{"title":"Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods","authors":"S. V. Bezzateev,&nbsp;S. G. Fomicheva,&nbsp;A. F. Suprun","doi":"10.3103/S0146411623080035","DOIUrl":"10.3103/S0146411623080035","url":null,"abstract":"<p>The information security problems for open multiagent systems using access control schemes based on RSA algorithm are analyzed. It is shown that when using such schemes, a significant part of the agents’ lifetime is spent on authentication processes. In order to increase the efficiency of multiagent systems by reducing the number of agent authentication processes, a method of access differentiation based on Goppa codes is justified and proposed. For the proposed methodology, an assessment of the security level of agents' information is given.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1005 - 1017"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recursive-Parallel Algorithm for Solving the Graph-Subgraph Isomorphism Problem 解决图-子图同构问题的递归-并行算法
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-27 DOI: 10.3103/S0146411623070155
V. V. Vasilchikov
{"title":"Recursive-Parallel Algorithm for Solving the Graph-Subgraph Isomorphism Problem","authors":"V. V. Vasilchikov","doi":"10.3103/S0146411623070155","DOIUrl":"10.3103/S0146411623070155","url":null,"abstract":"<p>The paper proposes a parallel algorithm for solving the graph-subgraph isomorphism problem and makes an experimental study of its efficiency. The problem is one of the most well-known NP-complete problems. Its solution may be required when solving many practical problems associated with the study of complex structures. We solve the problem in a formulation that requires finding all the existing isomorphic substitutions or proving their absence. Due to the complexity of the problem, it is natural to want to speed up its solution by parallelizing the algorithm. We use the RPM_ParLib library, developed by the author, as the main tool to program the algorithm. This library allows us to develop effective applications for parallel computing on a local network under the control of the runtime environment .NET Framework. Due to this library, the applications have the ability to generate parallel branches of computation directly during program execution and dynamically redistribute work between computing modules. Any language with support of the .NET Framework can be used as a programming language in conjunction with this library. For the numerical experiment, an open database from the Internet was used, which was specially developed to study algorithms for searching for isomorphic substitutions. The author has also developed a special application in C# for generating additional sets of initial data with the specified characteristics. The aim of the experiment is to study the speedup achieved due to the recursively parallel organization of computations. This paper provides a detailed description of the proposed algorithm and the results obtained during the experiment.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 7","pages":"672 - 682"},"PeriodicalIF":0.6,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Polynomial Algorithm of Finding the Shortest Path in a Divisible Multiple Graph 在可分割多重图中寻找最短路径的多项式算法
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-27 DOI: 10.3103/S0146411623070143
A. V. Smirnov
{"title":"The Polynomial Algorithm of Finding the Shortest Path in a Divisible Multiple Graph","authors":"A. V. Smirnov","doi":"10.3103/S0146411623070143","DOIUrl":"10.3103/S0146411623070143","url":null,"abstract":"<p>In this paper, we study undirected multiple graphs of any natural multiplicity <i>k</i> &gt; 1. There are edges of three types: ordinary edges, multiple edges, and multiedges. Each edge of the last two types is a union of <i>k</i> linked edges, which connect 2 or (<i>k</i> + 1) vertices, correspondingly. The linked edges should be used simultaneously. If a vertex is incident to a multiple edge, it can also be incident to other multiple edges and it can be the common end of <i>k</i> linked edges of some multiedge. If a vertex is the common end of some multiedge, it cannot be the common end of another multiedge. Divisible multiple graphs are characterized by the possibility to divide the graph into <i>k</i> parts, which are adjusted on the linked edges and which have no common edges. Each part is an ordinary graph. As for an ordinary graph, we can define the integer function of the length of an edge for a multiple graph and set the problem of the shortest path joining two vertices. Any multiple path is a union of <i>k</i> ordinary paths, which are adjusted on the linked edges of all multiple and multiedges. In this article, we show that the problem of the shortest path is polynomial for a divisible multiple graph. The corresponding polynomial algorithm is formulated. We also propose the modification of the algorithm for the case of an arbitrary multiple graph. This modification has an exponential complexity in the parameter <i>k</i>.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 7","pages":"841 - 853"},"PeriodicalIF":0.6,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信