Open Access
Issue
E3S Web of Conf.
Volume 402, 2023
International Scientific Siberian Transport Forum - TransSiberia 2023
Article Number 03027
Number of page(s) 10
Section Mathematical Modeling, IT, Industrial IoT, AI, and ML
DOI https://doi.org/10.1051/e3sconf/202340203027
Published online 19 July 2023
  1. The official website of the Accounting Chamber of the Russian Federation “How coronavirus changes the work of small and medium-sized businesses is available online: https://ach.gov.ru/news/kak-koronavirus-menyaet-rabotu-malogo-i-srednego-biznesa-zakrytie-magazinov-podderzhka-gosudarstva-i(accessed on 12 March 2022). [Google Scholar]
  2. The official website of Security Vision “Security Operation Center class Systems” is Available online: https://www.securityvision.ru/products/soc / (accessed on 28 March 2022). [Google Scholar]
  3. The report of the NCC and Rostelecom Solar on the study of a series of cyberattacks on public authorities of the Russian Federation Available online: https://rt-solar.ru/upload/iblock/53e/Otchet-Solar-JSOC-ob-issledovanii-serii-kiberatak-na-organy-gosudarstvennoy-vlasti-RF-_-web.pdf(accessed on 17 February 2022). [Google Scholar]
  4. A.Aleroud, L. Zhou, Comput. Secur. 68, 160–196(2017) [CrossRef] [Google Scholar]
  5. The official article “Avast Network Inspector Alert” is Available online: https://support.avast.com/en-en/article/eternalblue-vulnerability/(accessed on 27 February 2022). [Google Scholar]
  6. E.Benavides-Astudillo, L.Silva-Ordoñez, R.Rocohano-Rámos, W. Fuertes, F.Fernández-Peña, S.Sanchez-Gordon, R. Bastidas-Chalan, Commun. Comput. Inf. Sci. 1535, 351–364(2022) [Google Scholar]
  7. Article SecurityLab.ru by Positive Technologies “How much does a data breach cost in 2022” Available online: https://www.securitylab.ru/news/532987.php (accessed on 25 December 2022) [Google Scholar]
  8. IBM official website article “Cost of a data breach 2022” [Electronic resource] Available online: https://www.ibm.com/reports/data-breach (accessed on 09 January 2022) [Google Scholar]
  9. Solar JSOC report “Peculiarities of protecting confidential information in the financial sector” [Electronic resource] Available online: https://rt-solar.ru/upload/iblock/80b/Otchet-po-utechkam-v-bankakh-2020.pdf (accessed on 03 March 2022). [Google Scholar]
  10. Adelyar, S.H.; Norta, A. Towards a Secure Agile Software Development Process. In Proceedings of the 10th International Conference on the Quality of Information and Communications Technology (QUATIC), Lisbon, Portugal, 6–9 September 2016; pp. 101–106. [Google Scholar]
  11. J.Ning, Z.Cao, X. Dong, Inf. Forensics Secur. 13, 94–105(2018) [CrossRef] [Google Scholar]
  12. R.Vinayakumar, M.Alazab, S. Srinivasan,Q.V.Pham, S.K.Padannayil, K.A.Simran, IEEE Trans. Ind. Appl. 56, 4436–4456(2020) [CrossRef] [Google Scholar]
  13. J. Turnbull, Containerization is the new virtualization Kindle Edition (July 12, 2014) [Google Scholar]
  14. Q.Li, Q.F.Hao, L.M. Xiao, Comput. J. 54, 905–919 (2018) [Google Scholar]
  15. X.Zhang, Y.Zeng, X.B.Jin, Z.W.Yan, G.G. Geng, Boosting the phishing detection performance by semantic analysis. In Proceedings of the IEEE International Conference on Big Data (Big Data), Boston, MA, USA, pp. 1063–1070 (2017) [Google Scholar]
  16. J.T.Luttgens,M. Pepe,K. Mandia, Incident Response & Computer Forensics McGraw Hill; 3rd edition (August 4, 2014) [Google Scholar]
  17. Keras. Embedding Layer. Available online: https://keras.io/api/layers/corelayers/embedding (accessed on 11February 2022). [Google Scholar]
  18. M.G.Jaatun, D. Soares Cruzes, Care and Feeding of Your Security Champion. In Proceedings of the 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), Dublin, Ireland, 14–18 June 2021 [Google Scholar]
  19. Z. Alshingiti, R. Alaqel, J. Al-Muhtadi, Q.E.U. Haq, K. Saleem, M.H. Faheem, Electronics 12, 232 (2023) [CrossRef] [Google Scholar]
  20. J. Du, L. Zhao, F. Jie, IEEE Trans. Commun. 66, 1594–1608 (2018) [Google Scholar]
  21. IDC study: “Assessment of the level of satisfaction with SIEM systems in Russian companies” Available online:https://www.ptsecurity.com/ru-ru/research/analytics/idc-siem-research-2018/ (accessed on 14January 2022) [Google Scholar]
  22. Bianchi M. J., Conforto E. C., Amaral D. C. Beyond the agile methods: A diagnostic tool to support the development of hybrid models // International Journal of Managing Projects in Business. – 2021. [Google Scholar]
  23. Official documentation for the operation of the ArcSight Micro Focus Security ArcSight ESM SIEM system Available online:https://community.microfocus.com/cyberres/productdocs/w/esm_esmexpress_previous_releases/24702/esm-101-esm-7-0 (accessed on 02 March 2022). [Google Scholar]
  24. Benavides-Astudillo E. et al. Comparative Study of Deep Learning Algorithms in the Detection of Phishing Attacks Based on HTML and Text Obtained from Web Pages // Applied Technologies: 4th International Conference, ICAT 2022, Quito, Ecuador, November 23–25, 2022, Revised Selected Papers, Part I. – Cham : Springer Nature Switzerland, 2023. – С. 386-398. [Google Scholar]
  25. Article “Autopsy Forensic Browser” Available online: http://lostapp.ru/soft/autopsy-forensic-browser (accessed on 21February 2022). [Google Scholar]
  26. An article about the Rekall Framework analysis utility Available online: http://lostapp.ru/soft/rekall (accessed on 25February 2022). [Google Scholar]
  27. Official website of the matrix “MITER ATT&CK” Available online: https://attack.mitre.org/(accessed on 11February 2022). [Google Scholar]
  28. Cherckesova L. V. et al. Development of Quantum Protocol Modification CSLOE–2022, Increasing the Cryptographic Strength of Classical Quantum Protocol BB84 // Electronics. – 2022. – Т. 11. – №. 23. – С. 3954. [CrossRef] [Google Scholar]
  29. Korochentsev D. A. et al. Investigation of the Application of Software Generator of the Speech–Like Interference to Protect Acoustic Information from Leakage through an Acoustic Channel // Journal of Physics: Conference Series. – IOP Publishing, 2021. – Т. 2131. – №. 2. – С. 022091. [CrossRef] [Google Scholar]
  30. Revyakina Y. et al. Possibilities of conducting XSS-attacks and the development of countermeasures // E3S Web of Conferences. – EDP Sciences, 2020. – Т. 224. – С. 01040. [CrossRef] [EDP Sciences] [Google Scholar]
  31. Yeniaras E., Cenk M. Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation // Journal of Cryptographic Engineering. – 2022. – Т. 12. – №. 3. – С. 329-348. [CrossRef] [Google Scholar]
  32. Cheng H. et al. A lightweight implementation of NTRU Prime for the post-quantum internet of things // Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings 13. – Springer International Publishing, 2020. – С. 103-119. [Google Scholar]
  33. Smirnov I. A. et al. Modification and Optimization of Pollards's Factorization $\rho $-Method by Means of Recursive Algorithm of Number Calculation Factorization // 2019 IEEE East-West Design & Test Symposium (EWDTS). – IEEE, 2019. – С. 1-6. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.