Digital twin: A comprehensive survey of security threats
Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …
An integrity control model for multidimensional data arrays
SA Dichenko - Automatic Control and Computer Sciences, 2021 - Springer
An Integrity Control Model for Multidimensional Data Arrays | Automatic Control and
Computer Sciences Skip to main content SpringerLink Account Menu Find a journal Publish …
Computer Sciences Skip to main content SpringerLink Account Menu Find a journal Publish …
Security threat model under internet of things using deep learning and edge analysis of cyberspace governance
Z Li, Y Ge, J Guo, M Chen, J Wang - International Journal of System …, 2022 - Springer
Under the background of information age, it is essential to cope with network security
problems, ensure the popularization of Internet of Things (IoT) technology based on the …
problems, ensure the popularization of Internet of Things (IoT) technology based on the …
Big data security management countermeasures in the prevention and control of computer network crime
H Wang - Journal of Global Information Management (JGIM), 2021 - igi-global.com
This paper aims to study the Countermeasures of big data security management in the
prevention and control of computer network crime in the absence of relevant legislation and …
prevention and control of computer network crime in the absence of relevant legislation and …
Data protection in heterogeneous big data systems
MA Poltavtseva, EB Aleksandrova, VS Shmatov… - Journal of Computer …, 2023 - Springer
Abstract Modern Big Data systems are notable for their scale and, often, their distributed
organization. A feature of a number of Big Data systems is the use of heterogeneous data …
organization. A feature of a number of Big Data systems is the use of heterogeneous data …
Application of blockchain technology in the data processing security system of financial enterprises
H Yu - Security and Privacy, 2023 - Wiley Online Library
Data security is not only to consider administrative management methods and punitive
measures, but also technically from multiple perspectives such as data integrity …
measures, but also technically from multiple perspectives such as data integrity …
Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity
DS Lavrova, VM Bogina, DP Zegzhda… - Automatic Control and …, 2023 - Springer
In the paper, we propose an approach to estimate the cyber resilience of mobile networks
based on an estimate of the probability that the network will remain connected in the face of …
based on an estimate of the probability that the network will remain connected in the face of …
Ensuring the big data integrity through verifiable zero-knowledge operations
EB Aleksandrova, MA Poltavtseva… - … Symposium on Mobile …, 2021 - Springer
Abstract Information from databases is exposed to threats at all stages of its existence: from
recording and storing in the database to processing and returning to the user. Big Data …
recording and storing in the database to processing and returning to the user. Big Data …
Inference attacks and information security in databases
AA Poltavtsev, AR Khabarov, AO Selyankin - Automatic Control and …, 2020 - Springer
Security of modern data architectures implemented in relational DBMS's is analyzed. The
emphasis is placed on inference attacks, which are not prevented by traditional access …
emphasis is placed on inference attacks, which are not prevented by traditional access …
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods
SV Bezzateev, SG Fomicheva, AF Suprun - Automatic Control and …, 2023 - Springer
The information security problems for open multiagent systems using access control
schemes based on RSA algorithm are analyzed. It is shown that when using such schemes …
schemes based on RSA algorithm are analyzed. It is shown that when using such schemes …