MainCatalogInformatics, Computer Engineering and ControlMethods and Systems of Information Protection, Information Security
Practical implementation of the Siamese neural network in biometric palmar digital veins authentication
Authors: Desyatov A.G. | Published: 19.05.2023 |
Published in issue: #5(82)/2023 | |
DOI: DOI: 10.18698/2541-8009-2023-5-892 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: biometrics, authentication, palmar digital veins, deep learning, Siamese neural network, Conv2D, MaxPooling2D, Dropout, Dense, dataset |
Malware recognition system based on the representation of a binary file in the form of an image with machine learning
Authors: Panchekhin N.I., Desyatov A.G., Sidorkin A.D. | Published: 06.05.2023 |
Published in issue: #4(81)/2023 | |
DOI: DOI: 10.18698/2541-8009-2023-4-886 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: malware detection, static analysis, deep learning, artificial neural network, software, Python, Keras, dataset |
Quantum computers. Do they have a future?
Authors: Frolova T.O. | Published: 27.04.2023 |
Published in issue: #3(80)/2023 | |
DOI: DOI: 10.18698/2541-8009-2023-3-876 | |
Category: Mathematics | Chapter: Computational Mathematics | |
Keywords: quantum computer, quantum systems, bit, cubit, decoherence, superposition, algorithm |
Biometric authentication based on the pattern of the inner side of a human hand
Authors: Desyatov A.G., Sidorkin A.D., Panchekhin N.I. | Published: 22.12.2022 |
Published in issue: #12(77)/2022 | |
DOI: DOI: 10.18698/2541-8009-2022-12-844 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: biometrics, authentication, papillary lines, palm, deep learning, artificial neural network, Python, OpenCV, TensorFlow, webcam, data set |
Comparative analysis of Russian GOST R 34.12-2015 encryption standard and American encryption standard AES
Authors: Sobolev M.A. | Published: 17.05.2022 |
Published in issue: #4(69)/2022 | |
DOI: DOI: 10.18698/2541-8009-2022-4-785 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: cipher, encryption, cryptographic strength, rounds, gamming, “Grasshopper” algorithm, SP-net, AES standard |
Analysis of security issues of wireless self-organizing networks based on unmanned aerial vehicles
Authors: Kulagin G.I. | Published: 19.04.2022 |
Published in issue: #3(68)/2022 | |
DOI: DOI: 10.18698/2541-8009-2022-3-779 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: wireless self-organizing networks, unmanned aerial vehicles, information security, security vulnerabilities, information security threats, attack, information protection, FANET |
Process of developing a TCP server for secure communication between an application and a database
Authors: Marchenko A.V., Vanin A.V. | Published: 29.07.2020 |
Published in issue: #7(48)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-7-626 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: TCP server, security, exchange, data, database, application, request, efficiency, development, programming, interaction |
Embedding a digital watermark in MP3 audio files to counter the spread of counterfeit products
Authors: Serebryakova S.A. | Published: 26.05.2020 |
Published in issue: #5(46)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-5-610 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: steganography, digital steganography, information hiding, information protection, MP3 file, algorithm, code, frame |
The human factor in the information security of an organization: areas of research, countermeasures, prospects for study
Authors: Vanin A.V., Marchenko A.V. | Published: 08.05.2020 |
Published in issue: #4(45)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-4-601 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: human factor, information security, information security culture, socio-organizational and psychological aspects, security policy, security threats, awareness, holistic approach |
Review of human iris identification methods
Authors: Kandrina P.I. | Published: 23.03.2020 |
Published in issue: #3(44)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-3-587 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: mobile robot-nurse, vibration load, simulation, software, automated modeling, dynamics of a system of bodies, model of tire-road interaction, information protection, iris, biometric system, methods for identifying a person, intensity fluctuation, integral and differential operator, analysis of independent components, texture analysis |