MainCatalogInformatics, Computer Engineering and ControlMethods and Systems of Information Protection, Information Security
The human factor in the information security of an organization: areas of research, countermeasures, prospects for study
Authors: Vanin A.V., Marchenko A.V. | Published: 08.05.2020 |
Published in issue: #4(45)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-4-601 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: human factor, information security, information security culture, socio-organizational and psychological aspects, security policy, security threats, awareness, holistic approach |
Review of human iris identification methods
Authors: Kandrina P.I. | Published: 23.03.2020 |
Published in issue: #3(44)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-3-587 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: mobile robot-nurse, vibration load, simulation, software, automated modeling, dynamics of a system of bodies, model of tire-road interaction, information protection, iris, biometric system, methods for identifying a person, intensity fluctuation, integral and differential operator, analysis of independent components, texture analysis |
LSB Steganographic Algorithm Implementation in MATLAB App Designer
Authors: Yakovlev A.Yu. | Published: 04.03.2020 |
Published in issue: #2(43)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-2-582 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: steganography, MATLAB, App Designer, LSB algorithm, image processing, stegoanalysis, graphical user interface, RGB image model |
The role of authentication in the IoT systems
Authors: Bratko D.V., Berezin V.S. | Published: 30.01.2020 |
Published in issue: #1(42)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-1-570 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: Internet of things, authentication, Smart Home, threat model, security, information and communication technologies, automation, cloud platform |
Analysis of domestic software protection licensing systems
Authors: Marchenko A.V. | Published: 25.12.2019 |
Published in issue: #12(41)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-12-561 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: electronic keys, digital signature, certificates, protection, flash-cards, information security, analysis, licensing system, software, cryptographic algorithms |
DDOS attack detection and prevention methods
Authors: Kadyrov R.R. | Published: 06.08.2019 |
Published in issue: #7(36)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-7-507 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, denial of service attack, DoS, DDoS, detection and prevention mechanisms, architecture of mitigating the attacks consequences, false positives, access to resources |
Half step to successful employment
Authors: Pekshev N.A., Sinitsyn N.S. | Published: 30.07.2019 |
Published in issue: #7(36)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-7-504 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: polygraph, polygraph examination, human memory trace, potential employee, screening procedure, employer, psychological testing |
Interpolation implementation of Bayer pattern to PLIC in video stream processing tasks
Authors: Malygina S.V. | Published: 06.06.2019 |
Published in issue: #5(34)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-5-481 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: PLIC video stream processing, gamma correction, Bayer pattern, bilinear interpolation, image filtering, RAW, RAW converter, parallel programming |
System for analyzing and preventing threats to the security of personal data in an enterprise
Authors: Levinskiy A.T. | Published: 17.05.2019 |
Published in issue: #5(34)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-5-474 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: DLP-systems, safety, efficiency, Zecurion DLP, HTTP, FTP, blocking, array, data, protocol |
Algorithms of searching for admissible solutions to construct the matrix of the game in the problem of choice of protection objects under the restrictions on resources
Authors: Koshman A.A. | Published: 07.05.2019 |
Published in issue: #4(33)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-4-471 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information protection, game theory, Boolean programming, game matrix, optimal strategy, object of protection, resource restriction, incomplete enumeration, decision tree |