Исследование уязвимостей систем для защиты от атак по сторонним каналам

  • Руководитель: Зикратов Игорь Алексеевич

Публикации

  1. 32. Левина А.Б., Таранов С.В. Построение линейных и надежных кодов на основе коэффициентов масштабирующих функций вейвлетных преобразований // Сибирский журнал индустриальной математики - 2015. - Т. 18. - № 3(63). - С. 49-56 [IF: 0.304]
    подробнее >>
  2. 31. Spivak A., Andreev A., Sleptsova D. Localization of computer acoustic signal source // 8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014 - Conference Proceedings - 2014, pp. 7035972
    подробнее >>
  3. 30. Liyanage M., Ylianttila M., Gurtov A.V. Securing the Control Channel of Software-Defined Mobile Networks // Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, WoWMoM 2014 - 2014, pp. 6918981
    подробнее >>
  4. 29. Levina A.B. A New Block Ciphers Based on Wavelet Decomposition of Splines // Quasigroups and Related Systems - 2015, Vol. 23, No. 2, pp. 271-282 [SJR: 0.154]
    подробнее >>
  5. 28. Nikolaevskiy I., Lukyanenko A., Polishchuk T., Polishchuk V.M., Gurtov A.V. isBF: Scalable In-Packet Bloom Filter Based Multicast // Computer Communications - 2015, Vol. 70, pp. 79-85 [IF: 0.695, SJR: 0.889]
    подробнее >>
  6. 27. Krivtsova I., Lebedev I.S., Sukhoparov M.E., Bazhaev N., Zikratov I.A., Ometov A., Andreev S., Masek P., Fujdiak R., Hosek J. Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network // Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) - 2016, Vol. 9674, pp. 297-306 [SJR: 0.252]
    подробнее >>
  7. 26. Lebedev I.S., Krivtsova I.E., Korzhuk V., Bazhayev N., Sukhoparov M.E., Pecherkin S., Salakhutdinova K. The Analysis of Abnormal Behavior of the System Local Segment on the Basis of Statistical Data Obtained from the Network Infrastructure Monitoring // Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) - 2016, Vol. 9870, pp. 503-511 [SJR: 0.252]
    подробнее >>
  8. 25. Levina A., Korovkin M., Sleptsova D. Combined side-channel attacks on COMP128 // 8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014 - Conference Proceedings - 2014, pp. 7035902
    подробнее >>
  9. 24. Zikratov I.A., Lebedev I.S., Kuzmich E.V., Gurtov A.V. Securing swarm intellect robots with a police office model // 8th IEEE International Conference on Application of Information and Communication Technologies, AICT 2014 - Conference Proceedings - 2014, pp. 7035906
    подробнее >>
  10. 23. Korzun D.G., Nikolaevskiy I., Gurtov A.V. Service Intelligence Support for Medical Sensor Networks in Personalized Mobile Health Systems // Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) - 2015, Vol. 9247, pp. 116-127 [SJR: 0.252]
    подробнее >>
  11. 22. Ometov A., Olshannikova E., Masek P., Olsson T., Hosek J., Andreev S., Koucheryavy Y. Dynamic Trust Associations over Socially-Aware D2D Technology: A Practical Implementation Perspective // IEEE Access - 2016, Vol. 4, pp. 7692-7702 [IF: 1.27, SJR: 0.947]
    подробнее >>
  12. 21. Chiesa M., Nikolaevskiy I., Mitroviс S., Gurtov A.V., Madry A., Schapira M., Shenker S. On the Resiliency of Static Forwarding Tables // IEEE/ACM Transactions on Networking - 2017, Vol. 25, No. 2, pp. 1133-1146
    подробнее >>
  13. 20. Liyanage M., Abro A.B., Ylianttila M., Gurtov A.V. Opportunities and Challenges of Software-Defined Mobile Networks in Network Security Perspective // IEEE Security and Privacy Magazine - 2016, Vol. 14, No. 4, pp. 34-44 [IF: 0.902, SJR: 0.734]
    подробнее >>
  14. 19. Kumar P., Gurtov A.V., Iinatti J., Sain M., Ha P. Access Control Protocol with Node Privacy in Wireless Sensor Networks // IEEE Sensors Journal - 2016, Vol. 16, No. 22, pp. 8142-8150 [IF: 1.762, SJR: 0.759]
    подробнее >>
  15. 18. Budaghyan L., Carlet C., Helleseth T., Li N. On the (non-)existence of APN (n, n)-functions of algebraic degree n // IEEE International Symposium on Information Theory (ISIT) - Proceedings - 2016, pp. 480-484
    подробнее >>
  16. 17. Liyanage M., Chirkova J., Gurtov A.V. Access Point Selection Game for Mobile Wireless Users // Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, WoWMoM 2014 - 2014, pp. 6918913
    подробнее >>
  17. 16. Liyanage M., Ylianttila M., Gurtov A. A Novel Distributed Spanning Tree Protocol for Provider Provisioned VPLS Networks // IEEE International Conference on Communications, ICC 2014 - 2014, pp. 2982 - 2988
    подробнее >>
  18. 15. Zikratov I.A., Lebedev I.S., Korzhuk V.M. The Estimation of Secure Condition of Multi-Agent Robotic System in Case of Information Influence on the Single Element // Proceedings of the 17th Conference of Open Innovations Association FRUCT - 2015, pp. 362-367
    подробнее >>
  19. 14. Harjula E., Gurtov A.V., Koskela T., Ojala T., Ylianttila M. Energy-Aware Load Monitoring for Improving Battery Life of Mobile Peer-to-Peer Nodes // Sustainable Computing: Informatics and Systems - 2016, Vol. 12, pp. 43–54 [IF: 0.569]
    подробнее >>
  20. 13. Молдовян Н.А., Moldovyan A.A. Practical method for bi-deniable public-key encryption // Quasigroups and Related Systems - 2014, Vol. 22, No. 2, pp. 277-282 [SJR: 0.154]
    подробнее >>
  21. 12. Gurtov A., Porambage P., Nikolaevskiy I. Secure lightweight protocols for medical device monitoring // Open Innovations Association FRUCT, Proceedings of 15th Conference - 2014, pp. 46-51
    подробнее >>
  22. 11. Moldovyan N.A., Moldovyan A.A. Group signature protocol based on masking public keys // Quasigroups and Related Systems - 2014, Vol. 22, No. 1, pp. 133-140 [SJR: 0.154]
    подробнее >>
  23. 10. Levina A.B., Kuzmin I., Taranov S.V. Reed Solomon Codes and its Application for Cloud Storage System // 3rd International Conference on Future Generation Communication Technologies, FGCT 2014 - 2014, pp. 46-49
    подробнее >>
  24. 9. Zikratov I.A., Lebedev I.S., Gurtov A. Trust and Reputation Mechanisms for Multi-agent Robotic Systems // Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) - 2014, Vol. 8638, No. LNCS, pp. 106-120 [SJR: 0.252]
    подробнее >>
  25. 8. Levina A., Taranov S. Spline-wavelet robust code under non-uniform codeword distribution // Proceedings of the 2015 3rd International Conference on Computer, Communication, Control and Information Technology, C3IT 2015 - 2015, pp. 7060125
    подробнее >>
  26. 7. Ometov A., Orsino A., Militano L., Araniti G., Moltchanov D., Andreev S. A novel security-centric framework for D2D connectivity based on spatial and social proximity // Computer Networks - 2016, Vol. 107, No. 2, pp. 327-338 [IF: 1.256]
    подробнее >>
  27. 6. Zikratov I.A., Maslennikov O.V., Lebedev I.S., Ometov A., Andreev S. Dynamic Trust Management Framework for Robotic Multi-Agent Systems // Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) - 2016, Vol. 9870, pp. 339-348 [SJR: 0.252]
    подробнее >>
  28. 5. Lebedev I.S., Korzhuk V.M. The Monitoring of Information Security of Remote Devices of Wireless Networks // Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) - 2015, Vol. 9247, pp. 3-10 [SJR: 0.252]
    подробнее >>
  29. 4. Moldovian A.A., Moldovyan N.A., Berezin A.N. On using mersenne primes in designing cryptoschemes // International Journal of Network Security - 2016, Vol. 18, No. 2, pp. 369-373 [SJR: 0.507]
  30. 3. Braeken A., Porambage P., Gurtov A.V., Ylianttila M. Secure and Efficient Reactive Video Surveillance for Patient Monitoring // Sensors - 2016, Vol. 16, No. 1, pp. UNSP 32 [IF: 2.033, SJR: 0.546]
    подробнее >>
  31. 2. Nikolaevskiy I., Korzun D.G., Gurtov A.V. Security for Medical Sensor Networks in Mobile Health Systems // Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, WoWMoM 2014 - 2014, pp. 6918926
    подробнее >>
  32. 1. Levina A.B., Taranov S.V. Algorithms of Constructing Linear and Robust Codes Based on Wavelet Decomposition and its Application // Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) - 2015, Vol. 9084, pp. 247-258 [SJR: 0.252]
    подробнее >>