6 results on '"Vitaliy G. Ivanenko"'
Search Results
2. Improving functional reliability of biometric identification systems by introducing redundancy
- Author
-
Vitaliy G. Ivanenko, Nina D. Ivanova, and Aleksey G. Sabanov
- Subjects
General Medicine - Published
- 2022
- Full Text
- View/download PDF
3. Using cluster analysis techniques to optimize the qualitative assessment of information security risk
- Author
-
Vladimir L. Evseev, Anton S. Burakov, and Vitaliy G. Ivanenko
- Subjects
Information theory ,Information technology ,General Medicine ,Q350-390 ,T58.5-58.64 ,risk assessment, cluster analysis methods, nearest neighbor method, remote neighbor method, k-means method, degree of threat realization, degree of threat impact on the asset, euclidean distance, determining distance, average intra-cluster distance - Abstract
The study is devoted to the accuracy of information security risk assessment. The paper substantiates the relevance of risk assessment, based on the consequences of their implementation for business and the probability of their occurrence. The method of qualitative assessment of information security risks (the method of expert assessment) is analysed on a specific example. The application of cluster analysis methods is justified. In detail, the examples show the use of cluster analysis methods: the nearest neighbor method; the remote neighbor method; the k-means method. The principal disadvantages of the first two methods are: the appearance of large clusters that do not have similarities; the lack of the ability of experts to set the desired number of clusters in advance. The application of the k-means method is justified - the ability of experts to set the desired number of clusters in advance by setting the initial centers. The results obtained with the usual qualitative assessment are compared with the results obtained by the methods of cluster analysis. The expediency of using cluster analysis methods to improve the accuracy of information security risk assessment is justified.
- Published
- 2021
- Full Text
- View/download PDF
4. Analysis of the structure of construction and the main tactical and technical characteristics of automated security systems for stationary remote objects of increased security
- Author
-
Vitaliy G. Ivanenko and Vladimir L. Evseev
- Subjects
Physics ,lcsh:T58.5-58.64 ,lcsh:Information technology ,lcsh:Information theory ,General Medicine ,automated security system, structural diagram, objects of increased security, decomposition into subsystems, perimeter and local protection zones, efficiency indicator, reliability indicator, operational stability indicator, life cycle cost indicator ,lcsh:Q350-390 ,Mathematical physics - Abstract
Для формализации математической постановки задачи исследования по обоснованию программ модернизации автоматизированных систем охраны был проанализирован их состав, структура построения и основные тактико-технические характеристики. Современные системы охраны стационарных удаленных объектов повышенной защищенности представляют собой сложные автоматизированные системы, включающие в свой состав несколько функционально завершенных и объединенных в единый комплекс подсистем и дежурные силы охраны. Анализ структурной схемы типовых автоматизированных систем охраны стационарных удаленных объектов повышенной защищенности показал, что в общем случае применительно к рассматриваемой задаче существующих систем охраны целесообразно использовать декомпозицию на подсистемы, как способ метода системного анализа. С помощью подсистем автоматизированных систем охраны формируются периметровая и локальные зоны охраны. Каждая из подсистем и входящие в нее составные части в процессе функционирования выполняют одну или несколько функций, возлагаемых на систему охраны в целом. Результаты анализа показывают, что существующие автоматизированные системы охраны не в полной мере соответствуют требованиям руководящих документов, указывая, таким образом, на возможные направления их модернизации, включая применение технических средств обнаружения, работающих на различных физических принципах действия, телевизионных средств наблюдения и средств проноса (провоза) запрещенных материалов. Причем, принципиально возможна частичная модернизация в виде замены одного из двух технических средств обнаружения на более совершенные. Результаты исследования показали, что основными характеристиками автоматизированных систем охраны, определяющими их качество, являются интегральные показатели: эффективности; надежности; устойчивости функционирования; стоимости создания и эксплуатации автоматизированных систем охраны. Объединение нескольких интегральных показателей в один комплексный показатель было осуществлено с помощью процедур их специальной логико-весовой обработки, предусматриваемых в методе расстановки приоритетов. С учетом проведенного анализа состава, структуры построения и основных тактико-технических характеристик автоматизированных систем охраны, в дальнейшем может быть сформулирована математическая постановка задачи исследования.
- Published
- 2021
- Full Text
- View/download PDF
5. Security of significant objects of critical information infrastructure
- Author
-
Grigory P. Gavdan, Vitaliy G. Ivanenko, and Alexei A. Salkutsan
- Subjects
lcsh:T58.5-58.64 ,lcsh:Information technology ,lcsh:Information theory ,critical information infrastructure, significant objects of critical information infrastructure, infor-mation resources, cyberattack, cyberspace, structural units, staffing ,General Medicine ,lcsh:Q350-390 - Abstract
The issues related to the security of significant objects of critical information infrastructure are considered. The relevance of these problems is primarily due to the fact that the number of cyberattacks on various sectors of the Russian economy and primarily on significant objects of critical information infrastructure (state, defense, oil and gas industry, etc.) is increasing. Unfortunately, the limited access to the available information in this area does not allow today the researchers in the field of information security to conduct a proper analysis. In addition the corresponding media and Internet resources are incomplete. The tasks of ensuring the security of significant objects of critical information infrastructure in order to ensure their sustainable functioning under the destructive impact of computer attacks are regulated by a number of fundamental normative legal acts, primarily the Federal law No. 187-FZ "on security of critical information infrastructure of the Russian Federation" (2017) and the Doctrine of information security of the Russian Federation (2016). Currently at the stage of formation of the digital economy the creation of national information resources and the protection of significant objects of critical information infrastructure is one of the major sources of economic, political, social and military power of the state, the basis of socio-economic and socio-political development of the Russian Federation. The subject of the study is significant objects of critical information infrastructure as the basis of stability and existence of the state, the Russian Federation. The work pays considerable attention to the requirements for structural units to ensure the security of significant objects of critical information infrastructure. Thus, the risk of computer attacks for the subjects of critical information infrastructure has serious consequences, ranging from damage to the reputation and to the paralyzation of enterprise with the subsequent disruption of defense orders for the army and Navy. The requirements to structural units of security of significant objects of critical information infrastructure as well as to their staffing are considered.
- Published
- 2019
- Full Text
- View/download PDF
6. JPEG digital watermarking for copyright protection
- Author
-
Vitaliy G. Ivanenko and Nikita V. Ushakov
- Subjects
lcsh:T58.5-58.64 ,lcsh:Information technology ,Computer science ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,General Medicine ,computer.software_genre ,lcsh:Q350-390 ,Image (mathematics) ,Robustness (computer science) ,Container (abstract data type) ,digital watermarks, differential energy watermarking, images, embedding information, algorithm modification ,lcsh:Information theory ,Embedding ,Data mining ,Differential (infinitesimal) ,Digital watermarking ,computer ,Energy (signal processing) - Abstract
With the rapid growth of the multimedia technology, copyright protection has become a very important issue, especially for images. The advantages of easy photo distribution are discarded by their possible theft and unauthorized usage on different websites. Therefore, there is a need in securing information with technical methods, for example digital watermarks. This paper reviews digital watermark embedding methods for image copyright protection, advantages and disadvantages of digital watermark usage are produced. Different watermarking algorithms are analyzed. Based on analysis results most effective algorithm is chosen – differential energy watermarking. It is noticed that the method excels at providing image integrity. Digital watermark embedding system should prevent illegal access to the digital watermark and its container. Requirements for digital watermark are produced. Possible image attacks are reviewed. Modern modifications of embedding algorithms are studied. Robustness of the differential energy watermark is investigated. Robustness is a special value, which formulae is given further in the article. DEW method modification is proposed, it’s advantages over original algorithm are described. Digital watermark serves as an additional layer of defense which is in most cases unknown to the violator. Scope of studied image attacks includes compression, filtration, scaling. In conclusion, it’s possible to use DEW watermarking in copyright protection, violator can easily be detected if images with embedded information are exchanged.
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.