MainCatalogInformatics, Computer Engineering and ControlMethods and Systems of Information Protection, Information Security
Intelligent systems in the information engineering and technical protection
Authors: Yadykin N.V. | Published: 19.12.2023 |
Published in issue: #11(88)/2023 | |
DOI: DOI: 10.18698/2541-8009-2023-11-953 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information protection, security, intelligent systems, information engineering and technical protection, technical security systems, security alarm system, fire alarm systems, video surveillance systems, access control and management systems, technical security equipment, integrated technical security system |
Actual problems in the rights management system influence on reasults of the intellectual activities directly related to provision of protection and security
Authors: Grigoriev D.V. | Published: 19.06.2023 |
Published in issue: #6(83)/2023 | |
DOI: DOI: 10.18698/2541-8009-2023-6-906 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: intellectual property, intellectual property rights protection, government contract, intellectual activity results, state defense and security, service inventions, military-industrial complex, author remuneration |
Practical implementation of the Siamese neural network in biometric palmar digital veins authentication
Authors: Desyatov A.G. | Published: 19.05.2023 |
Published in issue: #5(82)/2023 | |
DOI: DOI: 10.18698/2541-8009-2023-5-892 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: biometrics, authentication, palmar digital veins, deep learning, Siamese neural network, Conv2D, MaxPooling2D, Dropout, Dense, dataset |
Malware recognition system based on the representation of a binary file in the form of an image with machine learning
Authors: Panchekhin N.I., Desyatov A.G., Sidorkin A.D. | Published: 06.05.2023 |
Published in issue: #4(81)/2023 | |
DOI: DOI: 10.18698/2541-8009-2023-4-886 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: malware detection, static analysis, deep learning, artificial neural network, software, Python, Keras, dataset |
Quantum computers. Do they have a future?
Authors: Frolova T.O. | Published: 27.04.2023 |
Published in issue: #3(80)/2023 | |
DOI: DOI: 10.18698/2541-8009-2023-3-876 | |
Category: Mathematics | Chapter: Computational Mathematics | |
Keywords: quantum computer, quantum systems, bit, cubit, decoherence, superposition, algorithm |
Biometric authentication based on the pattern of the inner side of a human hand
Authors: Desyatov A.G., Sidorkin A.D., Panchekhin N.I. | Published: 22.12.2022 |
Published in issue: #12(77)/2022 | |
DOI: DOI: 10.18698/2541-8009-2022-12-844 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: biometrics, authentication, papillary lines, palm, deep learning, artificial neural network, Python, OpenCV, TensorFlow, webcam, data set |
Comparative analysis of Russian GOST R 34.12-2015 encryption standard and American encryption standard AES
Authors: Sobolev M.A. | Published: 17.05.2022 |
Published in issue: #4(69)/2022 | |
DOI: DOI: 10.18698/2541-8009-2022-4-785 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: cipher, encryption, cryptographic strength, rounds, gamming, “Grasshopper” algorithm, SP-net, AES standard |
Analysis of security issues of wireless self-organizing networks based on unmanned aerial vehicles
Authors: Kulagin G.I. | Published: 19.04.2022 |
Published in issue: #3(68)/2022 | |
DOI: DOI: 10.18698/2541-8009-2022-3-779 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: wireless self-organizing networks, unmanned aerial vehicles, information security, security vulnerabilities, information security threats, attack, information protection, FANET |
Process of developing a TCP server for secure communication between an application and a database
Authors: Marchenko A.V., Vanin A.V. | Published: 29.07.2020 |
Published in issue: #7(48)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-7-626 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: TCP server, security, exchange, data, database, application, request, efficiency, development, programming, interaction |
Embedding a digital watermark in MP3 audio files to counter the spread of counterfeit products
Authors: Serebryakova S.A. | Published: 26.05.2020 |
Published in issue: #5(46)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-5-610 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: steganography, digital steganography, information hiding, information protection, MP3 file, algorithm, code, frame |