Author Details

Zegzhda, D. P.

Issue Section Title File
Vol 50, No 8 (2016) Article Applying the group signature for entity authentication in distributed grid computing networks
Vol 50, No 8 (2016) Article Multiagent system controllability evaluation using the multilevel structure of the graph of agents
Vol 50, No 8 (2016) Article Sustainability as a criterion for information security in cyber-physical systems
Vol 51, No 8 (2017) Article Cyber-physical system homeostatic security management
Vol 51, No 8 (2017) Article Systematization and security assessment of cyber-physical systems
Vol 51, No 8 (2017) Article Use of Intel SGX to ensure the confidentiality of data of cloud users
Vol 51, No 8 (2017) Article Protection of Wi-Fi network users against rogue access points
Vol 52, No 8 (2018) Article Cyber-sustainability of Software-Defined Networks Based on Situational Management
Vol 52, No 8 (2018) Article Approaches to Modeling the Security of Cyberphysical Systems
Vol 52, No 8 (2018) Article A Blockchain Decentralized Public Key Infrastructure Model
Vol 52, No 8 (2018) Article Ensuring Secure Data Input/Output Operations for SGX ENCLAVE
Vol 52, No 8 (2018) Article Analysis of the Information Security Threats in the Digital Production Networks
Vol 52, No 8 (2018) Article Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph
Vol 52, No 8 (2018) Article Problems of Security in Digital Production and Its Resistance to Cyber Threats
Vol 52, No 8 (2018) Article Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology
Vol 52, No 8 (2018) Article Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Vol 52, No 8 (2018) Article Architecture of the Protected Cloud Data Storage Using Intel SGX Technology
Vol 52, No 8 (2018) Article Digital Manufacturing Security Indicators
Vol 53, No 5 (2019) Article Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time
Vol 53, No 8 (2019) Article Application of an Artificial Neural Network for Detection of Attacks in VANETs
Vol 53, No 8 (2019) Article Big Data Management System Security Threat Model
Vol 53, No 8 (2019) Article Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Vol 53, No 8 (2019) Article An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
Vol 53, No 8 (2019) Article Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
Vol 53, No 8 (2019) Article Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies