Analysis of single-board computers for IoT and IIoT solutions in embedded control systems

P Galkin, L Golovkina… - … Conference Problems of …, 2018 - ieeexplore.ieee.org
The article presents analysis of single-board computers for Internet of Things solutions.
Analysis of single-board computers for Industrial Internet of Things solutions. Overview of the …

Method of error control of the information presented in the modular number system

V Krasnobayev, S Koshman, A Yanko… - … and Technology (PIC …, 2018 - ieeexplore.ieee.org
A method for error control in the modular number system (MNS) based on the use of the
zeroing procedure is proposed. This method is designed to verify the correct implementation …

Signal statistic and informational parameters of deterministic chaos transistor oscillators for infocommunication systems

A Semenov, O Osadchuk, O Semenova… - … and Technology (PIC …, 2018 - ieeexplore.ieee.org
The paper presents electrical circuits and mathematical models for two versions of a
transistor Colpitts oscillator. The chaotic dynamic of these Colpitts oscillator versions has …

Experimental studies of ransomware for developing cybersecurity measures

A Snihurov, O Shulhin… - … Conference Problems of …, 2018 - ieeexplore.ieee.org
The study presents the results of the experiment on static and dynamic analysis of
Petya/ExPetr ransomware. Methods of ransomware distribution, its actions when entering …

Intrusion Detection of Traffic Realizations Based on Maching Learning Using Fractal Properties

T Radivilova, D Ageiev, L Kirichenko… - … on Information and …, 2018 - ieeexplore.ieee.org
In this article we consider the problem of intrusion detection in computer networks by the
realizations of network traffic. To solve this problem, time series analysis methods, fractal …

Proactive Approach for Security of the Infocommunication Network Based on Vulnerability Assessment

M Yevdokymenko, A Shapovalova… - … and Technology (PIC …, 2018 - ieeexplore.ieee.org
The paper explores methods for assessing vulnerabilities and assessing the spread of an
attack in an infocommunication network. A proactive approach to the quantitative …

Intrusion Detection in Multiservice Network on the Basis of Registered Traffic Filtration

V Kartashevskiy, I Pozdnyak… - … Conference Problems of …, 2018 - ieeexplore.ieee.org
The paper proposes a detection option of the anomalous component of the observed traffic
based on traffic processing by a linear filter with a known impulse response. Based on a …

Development of software system for network traffic analysis and intrusion detection

M Beshley, S Toliupa, V Pashkevych… - … on Information and …, 2018 - ieeexplore.ieee.org
In this paper the software system for network traffic analysis and intrusion detection has
been developed. The system for monitoring and analyzing of traffic to detect anomalies and …