Digital twin: A comprehensive survey of security threats

C Alcaraz, J Lopez - IEEE Communications Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Industry 4.0 is having an increasingly positive impact on the value chain by modernizing and
optimizing the production and distribution processes. In this streamline, the digital twin (DT) …

An integrity control model for multidimensional data arrays

SA Dichenko - Automatic Control and Computer Sciences, 2021 - Springer
An Integrity Control Model for Multidimensional Data Arrays | Automatic Control and
Computer Sciences Skip to main content SpringerLink Account Menu Find a journal Publish …

Security threat model under internet of things using deep learning and edge analysis of cyberspace governance

Z Li, Y Ge, J Guo, M Chen, J Wang - International Journal of System …, 2022 - Springer
Under the background of information age, it is essential to cope with network security
problems, ensure the popularization of Internet of Things (IoT) technology based on the …

Big data security management countermeasures in the prevention and control of computer network crime

H Wang - Journal of Global Information Management (JGIM), 2021 - igi-global.com
This paper aims to study the Countermeasures of big data security management in the
prevention and control of computer network crime in the absence of relevant legislation and …

Data protection in heterogeneous big data systems

MA Poltavtseva, EB Aleksandrova, VS Shmatov… - Journal of Computer …, 2023 - Springer
Abstract Modern Big Data systems are notable for their scale and, often, their distributed
organization. A feature of a number of Big Data systems is the use of heterogeneous data …

Application of blockchain technology in the data processing security system of financial enterprises

H Yu - Security and Privacy, 2023 - Wiley Online Library
Data security is not only to consider administrative management methods and punitive
measures, but also technically from multiple perspectives such as data integrity …

Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity

DS Lavrova, VM Bogina, DP Zegzhda… - Automatic Control and …, 2023 - Springer
In the paper, we propose an approach to estimate the cyber resilience of mobile networks
based on an estimate of the probability that the network will remain connected in the face of …

Ensuring the big data integrity through verifiable zero-knowledge operations

EB Aleksandrova, MA Poltavtseva… - … Symposium on Mobile …, 2021 - Springer
Abstract Information from databases is exposed to threats at all stages of its existence: from
recording and storing in the database to processing and returning to the user. Big Data …

Inference attacks and information security in databases

AA Poltavtsev, AR Khabarov, AO Selyankin - Automatic Control and …, 2020 - Springer
Security of modern data architectures implemented in relational DBMS's is analyzed. The
emphasis is placed on inference attacks, which are not prevented by traditional access …

Identification of cyber threats in networks of industrial internet of things based on neural network methods using memory

VM Krundyshev - Automatic Control and Computer Sciences, 2020 - Springer
It is proposed to use modern artificial neural networks to identify cyber threats in networks of
the Industrial Internet of Things. The modeling of an industrial system under the influence of …