default search action
11th SIN 2019: Sochi, Russia
- Oleg B. Makarevich, Dmitry Popov, Ludmila K. Babenko, Pete Burnap, Atilla Elçi, Ron Poet, Jaideep Vaidya, Mehmet A. Orgun, Manoj Singh Gaur, Rajveer Singh Shekhawat:
Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019, Sochi, Russian Federation, September 12-15, 2019. ACM 2019, ISBN 978-1-4503-7242-8 - Alexander N. Tselykh, Vladislav Vasilev, Larisa A. Tselykh:
Managing influence in complex systems to ensure safety of their operation. 1:1-1:6 - Andrey N. Ragozin, V. F. Telezhkin, P. S. Podkorytov:
Forecasting complex multi-component time series within systems designed to detect anomalies in dataflows of industrial automated systems. 2:1-2:5 - Antonina Komarova, Anatoly Korobeynikov:
Combined authentication schemes with increasing level of resistance and methods for improving the security of electronic signature schemes: kombinirovannye skhemy autentifikacii s povyshennym urovnem stojkosti i metody povysheniya bezopasnosti skhem elektronnoj podpisi. 3:1-3:8 - Alexey Nikolaevich Shniperov, Aleksandra Vladimirovna Prokofieva:
Steganalysis method of static JPEG images based on artificial immune system. 4:1-4:7 - Hope Nkiruka Eke, Andrei Petrovski, Hatem Ahriz:
The use of machine learning algorithms for detecting advanced persistent threats. 5:1-5:8 - Vyacheslav V. Zolotarev, Alina O. Povazhnyuk, Ekaterina A. Maro:
Liveness detection methods implementation to face identification reinforcement in gaming services. 6:1-6:6 - Igor V. Kotenko, Igor Saenko, Yury Sineshchuk, Valery Kuvatov, Oleg Chudakov:
Optimization of the cyber security system structure based on accounting of the prevented damage cost. 7:1-7:8 - Kunbolat Algazy, Rustem Biyashev, Nursulu Kapalova, Ludmila K. Babenko, Evgeniya Ishchukova, Saule Nyssanbayeva:
Investigation of the different implementations for the new cipher Qamal. 8:1-8:8 - Vasiliy M. Krundyshev, Maxim O. Kalinin:
Hybrid neural network framework for detection of cyber attacks at smart infrastructures. 9:1-9:7 - Evgeniya Ishchukova, Ekaterina Maro, Gennady Veselov:
Development of information security quest based on use of information and communication technologies. 10:1-10:5 - Elena Basan, Oleg B. Makarevich, Evgeny Abramov, Dmitry Popov:
Analysis of the initial security of the robotics system. 11:1-11:8 - Mohamed Amine Daoud, Youcef Dahmani, Kadda Mostefaoui:
IDS-DL: A description language for detection system in cloud computing. 12:1-12:8 - Andrey V. Krasovsky, Ekaterina A. Maro:
Actual and historical state of side channel attacks theory. 13:1-13:7 - Vitaly V. Lapshichyov, Oleg B. Makarevich:
TLS certificate as a sign of establishing a connection with the network Tor. 14:1-14:6 - Karim Lounis, Mohammad Zulkernine:
Bad-token: denial of service attacks on WPA3. 15:1-15:8 - Igor V. Kotenko, Nikolay Komashinsky:
Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework. 16:1-16:8 - Anil K. Saini, Shreyansh Sharma, Palash Jain, Vikash Sharma, Arvind Kumar Khandelwal:
A secure priority vehicle movement based on blockchain technology in connected vehicles. 17:1-17:8 - Valeriy O. Osipyan, Kirill I. Litvinov, R. Kh. Bagdasaryan, E. P. Lukashchik, S. G. Sinitsa, A. S. Zhuk:
Development of information security system mathematical models by the solutions of the multigrade Diophantine equation systems. 18:1-18:8 - Denis Chernov, Alexey Sychugov:
Method of identifying and assessing of automated process control systems vulnerable elements. 19:1-19:4 - Stanislav L. Belyakov, Alexander V. Bozhenyuk, Olesiya Kosenko, Evgeny Kosenko:
Evaluation of information reliability of complex systems using intuitionistic fuzzy graphs. 20:1-20:4 - Kirill Borisov, Irina Lubushkina, Sergey Panasenko:
Adaptation of an authentication protocol based on asymmetric keys for use in UAV C2 link security systems. 21:1-21:4 - Stanislav L. Belyakov, Alexander V. Bozhenyuk, Marina Savelyeva, Marina Belyakova:
Safety analysis of the flow of cartographic data with defects. 22:1-22:4 - Alexander N. Sokolov, Andrey N. Ragozin, Ilya A. Pyatnitsky, Sergei K. Alabugin:
Applying of digital signal processing techniques to improve the performance of machine learning-based cyber attack detection in industrial control system. 23:1-23:4 - Yaroslav Tarasov, Ekaterina Pakulova, Oleg Basov:
Modeling of low-rate DDoS-attacks. 24:1-24:4 - Dmitriy Levonevskiy, Fedor Novikov, Ludmila N. Fedorchenko, Irina Afanasieva:
Verification of internet protocol properties using cooperating automaton objects. 25:1-25:4 - Ekaterina Pakulova, Artem Ryndin, Oleg Basov:
Multi-path multimodal authentication system for remote information system. 26:1-26:4 - Liudmila Babenko, Ilya Pisarev, Elena Popova:
Cryptographic protocols implementation security verification of the electronic voting system based on blind intermediaries. 27:1-27:5 - Abdul Ashraf, Ron Poet:
Is it better to choose seen or unseen distracters for graphical passwords. 28:1-28:4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.