MainCatalogInformatics, Computer Engineering and ControlMethods and Systems of Information Protection, Information Security
Detection of bots in social networks by means of multilayered perceptron
Authors: Khachatryan M.G., Chepik P.I. | Published: 09.04.2019 |
Published in issue: #4(33)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-4-463 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: social networks, Twitter, bot, account, neural networks, cross-validation, metric, classification |
The ways of noise-immunity improvement in the radio channels
Authors: Filatov V.I., Borukaeva A.O., Berdikov P.G. | Published: 27.03.2019 |
Published in issue: #3(32)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-3-455 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: data transfer, radio communication, code division, modulation, bandwidth, security, noise immunity, signal-to-noise ratio |
Assessment of the reliability of information collected from social networks
Authors: Kharlamov N.L., Latysheva L.A. | Published: 18.03.2019 |
Published in issue: #3(32)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-3-452 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: social network, social graph, community highlighting, search for bots, public opinion leaders, virtual users, algorithm for detecting bots |
Synthesis and recognition of artificial biometric images
Authors: Rychkov A.S. | Published: 13.03.2019 |
Published in issue: #3(32)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-3-451 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: биометрический образ, метод генерации отпечатков пальцев, цифровое изображение, гистограмма, фильтрация, отпечаток пальца, алгоритм распознавания, шумы на цифровом изображении |
The information security threats conditioned by incorrect password selection
Authors: Sukhorukova N.A. | Published: 15.02.2019 |
Published in issue: #2(31)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-2-444 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information protection, information security threats, password compromise, password cracking methods, password entropy, password resistance, password rating, password selection |
Research and statistical analysis of attacks on neural networks in technical vision tasks
Authors: Kapitonova L.I., Ushakova A.A., Shalna N.A., Storozheva A.A. | Published: 15.02.2019 |
Published in issue: #2(31)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-2-443 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: neural network, dataset, hostile attack, protection against attacks, neural network vulnerabilities, gradient method, pixel attacks, security administrator |
Noise models in artificial biometric images
Authors: Rychkov A.S. | Published: 16.01.2019 |
Published in issue: #1(30)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-1-425 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: digital image, noise model, digital image noise, biometric data, recognition, biometric image, fingerprint, synthesis of biometric images |
Product testing techniques from its development to production
Authors: Kisareva N.Yu., Levinskiy A.T. | Published: 17.12.2018 |
Published in issue: #12(29)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-12-413 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: testing, software, methodology, development, module, unit testing, integration, alpha-testing |
Estimation of memory usage of the field programmable gate arrays by simple algorithms such as the fast Fourier transform using the LABVIEW FPGA module
Authors: Cheredanova E.M., Mamchenko E.A. | Published: 26.11.2018 |
Published in issue: #11(28)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-11-408 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: the fast Fourier transform, field programmable gate arrays, FPGA, LabVIEW, virtual instrument, binary file |
Determined key phrases search and recognition in continuous speech
Authors: Levinskiy A.T., Bykovskiy M.K. | Published: 12.11.2018 |
Published in issue: #11(28)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-11-399 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: recognition, error, interface, testing, Levenshtein method, w-shingling, comparison, function |