Author Details

Zegzhda, D. P.

Issue Section Title File
Vol 50, No 8 (2016) Article Applying the group signature for entity authentication in distributed grid computing networks
Vol 50, No 8 (2016) Article Multiagent system controllability evaluation using the multilevel structure of the graph of agents
Vol 50, No 8 (2016) Article Sustainability as a criterion for information security in cyber-physical systems
Vol 51, No 8 (2017) Article Cyber-physical system homeostatic security management
Vol 51, No 8 (2017) Article Systematization and security assessment of cyber-physical systems
Vol 51, No 8 (2017) Article Use of Intel SGX to ensure the confidentiality of data of cloud users
Vol 51, No 8 (2017) Article Protection of Wi-Fi network users against rogue access points
Vol 52, No 8 (2018) Article Cyber-sustainability of Software-Defined Networks Based on Situational Management
Vol 52, No 8 (2018) Article Approaches to Modeling the Security of Cyberphysical Systems
Vol 52, No 8 (2018) Article A Blockchain Decentralized Public Key Infrastructure Model
Vol 52, No 8 (2018) Article Ensuring Secure Data Input/Output Operations for SGX ENCLAVE
Vol 52, No 8 (2018) Article Analysis of the Information Security Threats in the Digital Production Networks
Vol 52, No 8 (2018) Article Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph
Vol 52, No 8 (2018) Article Problems of Security in Digital Production and Its Resistance to Cyber Threats
Vol 52, No 8 (2018) Article Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology
Vol 52, No 8 (2018) Article Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Vol 52, No 8 (2018) Article Architecture of the Protected Cloud Data Storage Using Intel SGX Technology
Vol 52, No 8 (2018) Article Digital Manufacturing Security Indicators
Vol 53, No 5 (2019) Article Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time
Vol 53, No 8 (2019) Article Application of an Artificial Neural Network for Detection of Attacks in VANETs
Vol 53, No 8 (2019) Article Big Data Management System Security Threat Model
Vol 53, No 8 (2019) Article Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Vol 53, No 8 (2019) Article An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
Vol 53, No 8 (2019) Article Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
Vol 53, No 8 (2019) Article Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls