Вопросы кибербезопасности цифровых финансовых сервисов

ГВ Федотова, ЕР Орлова, ИЕ Бочарова - … и вычислительные системы, 2022 - mathnet.ru
В статье рассмотрены проблемы безопасности цифровых финансовых сервисов,
функционирующих в настоящее время исключительно в онлайн-формате. Это привело …

Resource analysis of the log files storage based on simulation models in a virtual environment

S Magomedov, D Ilin, E Nikulchev - Applied Sciences, 2021 - mdpi.com
In order to perform resource analyses, we here offer an experimental stand on virtual
machines. The concept of how to measure the resources of each component is proposed. In …

Application of text mining technologies in Russian language for solving the problems of primary financial monitoring

VY Radygin, DY Kupriyanov, RA Bessonov… - Procedia Computer …, 2021 - Elsevier
The paper deals with the issues of text mining based on a vector classification model. The
term frequency and inverse document frequency function (TF IDF) is used as a measure to …

Evaluation of user reactions and verification of the authenticity of the user's identity during a long web survey

E Nikulchev, A Gusev, D Ilin, N Gazanova, S Malykh - Applied Sciences, 2021 - mdpi.com
Web surveys are very popular in the Internet space. Web surveys are widely incorporated for
gathering customer opinion about Internet services, for sociological and psychological …

Isolated Sandbox Environment Architecture for Running Cognitive Psychological Experiments in Web Platforms

E Nikulchev, D Ilin, P Kolyasnikov, S Magomedov… - Future Internet, 2021 - mdpi.com
Web surveys are an integral part of the feedback of Internet services, a research tool for
respondents, including in the field of health and psychology. Web technologies allow …

Users' reaction time for improvement of security and access control in web services

S Magomedov, A Gusev, D Ilin, E Nikulchev - Applied Sciences, 2021 - mdpi.com
This paper concerns the case of the development of a technology for increasing the
efficiency of access control based on the user behavior monitoring built into a software …

Approach to Recognition of Malicious Behavior Based on Autoregression Model upon Investigation into Cyberincident

SI Smirnov, MA Eremeev, IA Pribylov - Automatic Control and Computer …, 2021 - Springer
An approach to recognition of malicious behavior based on analysis of the Security. evtx
security log of Windows operating system upon investigation into a security incident is given …

Protected network architecture for ensuring consistency of medical data through validation of user behavior and DICOM archive integrity

S Magomedov, A Lebedev - Applied Sciences, 2021 - mdpi.com
The problem of consistency of medical data in Hospital Data Management Systems is
considered in the context of correctness of medical images stored in a PACS (Picture …

Проблемы кибербезопасности современных цифровых систем

ГВ Федотова, ЕР Орлова, ИС Ларионова… - 2023 - elibrary.ru
Монография посвящена исследованию проблем поддержания кибербезопасности в
цифровом мире в свете нарастающих угроз и появления новых рисков глобальной …

Trajectory Correction of Autonomous Objects in the Presence of Restrictions

ZV Ilyichenkova, SM Ivanova, AI Volkov… - 2022 Systems of …, 2022 - ieeexplore.ieee.org
The traffic safety of an automatic transport facility is one of the most pressing and interesting
problems. The use of neural networks to solve this problem is the most promising …