Shelupanov Aleksandr Aleksandrovich
Articles:
- Activity concepts on information protection
- Algorithm for applying short-term forecasting for detecting information security incidents through the network traffic analysis
- Application of machine learning methods and feature selection based on a genetic algorithm in solving the problem of determining the authorship of a Russian-language text for cybersecurity
- Applications of cellular automata in the field of information security and data processing
- Approaches to designing protected archives based on secret division
- Assessment of employee reliability in the human resources of the enterprise
- Basic approaches to the use of mathematical apparatus of cellular automata theory for the tasks of encoding information
- Calculating and designing changeable active filters
- Cognitive model for assessing the security of information systems for various purposes
- Computer-based system for vetting information system of personal data – «AIST-P»
- Continuous optimization using a hybrid model of cellular automata and learning automata
- Current state of the data transmission problem in hetero- geneous communication systems
- Development of a methodology for identifying the authorship of binary and disassembled program codes based on an ensemble of modern natural language processing methods
- Domestic and foreign experience in security testing
- Embedding information into JPEG images with distortion masking in frequency domain
- Engineering of imitation model of a complex network of security systems
- Engineering of the network management system
- Ensuring of information protection in the medical biometric data processing
- Evaluation of side electromagnetic radiation of electronic devices
- Forecasting in the system of LAN monitoring
- Generalized authorship identification technique
- Generator of primality criteria based on properties of the composition of generating functions
- Identifying regimes for generating frequency ranges of active protection facilities
- Imitating modeling of message system the transfer using a variation of routes
- Implementation of Take-Grant model as a representation of user access rights differentiation system in the building
- Intelligent System Architecture for Identification of the Source Code Author
- Life-cycle models and security threats to the microchip during its development and exploitation
- Mathematical model for selecting a contractor to assess information security risks
- Methodology to determine the age of the text’s author based on readability and lexical diversity metrics
- Model of threats to automatic system for commercial accounting of power consumption
- Models of increasing the information security level of certification authority
- Modern trends in development of methods and means for information protection
- New challenges: stochastic threats to national security
- Overview of solutions used in commercial energy accounting systems for data / telemetry in heterogeneous communication systems
- Petri nets, Markov as a tool for creating analytical models for the main types of unauthorized access to the information system
- Pre-project design of personal data information systems as a stage of the information security audit
- Research of the direction of secondary electromagnetic radiation from a personal computer
- Secure information technology platform of certification authority virtual server
- Surgical equipment for search of arrhythmogenic sources by multichannel epicardial mapping
- The approach to optimization of resources for information protection in organizational systems
- The integration method the data rotating X-ray and electrical location systems for visualization of anatomical structures of the heart and the surgical tool
- The methodology of preparatory stage of computer forensics
- Theoretical aspects of particular methodologies design support system for computer forensics provision