Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
DETECTION OF ANOMALIES IN POWER SYSTEMS: USING THE ISOLATION FOREST MODEL TO IDENTIFY CYBER THREATS
Kochergin, Sergey V., Artemova, Svetlana V., Bakaev, Anatoly A., Maksimova, Elena А., Mityakov, Evgenii S., Vegera, Zhanna K.
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.02.2025)
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.02.2025)
Get full text
Journal Article
Loading…
Loading…
EXTENDED CYBEREASON’S SOC MATURITY MODEL
Listratov, Ilya S., Miloslavskaya, Natalia G., Sirbay, Ilya S., Reinoso, Brito A.
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.02.2025)
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.02.2025)
Get full text
Journal Article
Loading…
AN APPROACH TO SETTING GENERAL REQUIREMENTS FOR A TRUSTED ELECTRONIC COMPONENT A BASE FOR A REGULATED MARKET OF CRITICAL INFORMATION INFRASTRUCTURE IN QUESTIONS AND ANSWERS
Leonid N. Kessarinskiy, Alexander Yu. Nikiforov
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.02.2025)
Get full text
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.02.2025)
Journal Article
Loading…
THE APPLICATION OF NON-INJECTIVE VECTORS IN KNAPSACK CRYPTOSYSTEMS
Volkov, Maria Sabina A., Gordeev, Eduard N.
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.02.2025)
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.02.2025)
Get full text
Journal Article
Loading…
METHODOLOGICAL ASPECTS OF CONSTRUCTING MATHEMATICAL MODELS FOR THE TEMPORARY CHARACTERISTICS OF THREATS OF THE ELECTROMAGNETIC EFFECTS ON COMPLEXES FOR PHYSICAL PROTECTING THE ARCTIC ZONE MARINE PORTS
Sychev, Mikhail P., Krupenin, Alexander V., Sychev, Artyom M., Storozhuk, Evgeny A., Khodyrev, Timofey B., Milov, Alexey S.
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.02.2025)
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.02.2025)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
An approach to predicting the properties of software vulnerabilities
Budnikov, Sergey A., Tarelkin, Mikhail A., Yazov, Yuri K.
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.11.2024)
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.11.2024)
Get full text
Journal Article
Loading…
Loading…
Acceleration of modular arithmetic in post-quantum signature schemes
Zhukov, Igor Y., Ivanenko, Vitaliy G., Ivanova, Irina D., Ivanova, Nina D.
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.11.2024)
Published in Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ (01.11.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…