Alexey Markov

ORCID: 0000-0003-0111-7377
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Information and Cyber Security
  • Software Reliability and Analysis Research
  • Advanced Data Processing Techniques
  • Advanced Malware Detection Techniques
  • Economic and Technological Systems Analysis
  • Technology Assessment and Management
  • Web Application Security Vulnerabilities
  • Software Testing and Debugging Techniques
  • Cybersecurity and Cyber Warfare Studies
  • Legal and Policy Issues
  • Security, Politics, and Digital Transformation
  • Cybersecurity and Information Systems
  • Digital and Cyber Forensics
  • European and Russian Geopolitical Military Strategies
  • Risk and Safety Analysis
  • Logic, programming, and type systems
  • Network Security and Intrusion Detection
  • Advanced Research in Systems and Signal Processing
  • Parallel Computing and Optimization Techniques
  • Network Packet Processing and Optimization
  • Big Data and Business Intelligence
  • Vehicle License Plate Recognition
  • Ancient Near East History
  • Real-Time Systems Scheduling
  • Optics and Image Analysis

Saveetha University
2025

B.S. Abdur Rahman Crescent Institute of Science & Technology
2024

Mother Teresa Women's University
2024

Bauman Moscow State Technical University
2016-2023

Perm National Research Polytechnic University
2018

Murmansk State Technical University
2016-2017

A.P. Ershov Institute of Informatics Systems, Siberian Branch of the Russian Academy of Sciences
2002

Institute of Informatics Problems
2002

This research proposes a novel security solution for IoT networks by integrating Practical Byzantine Fault Tolerance (PBFT) with Elliptic Curve Cryptography (ECC). The approach aims to enhance authentication, ensure data integrity, and optimize resource use in resource-constrained environments. By combining ECC's lightweight cryptographic capabilities PBFT's consensus model, the system achieves high performance, scalability, robust fault tolerance, providing secure framework communication....

10.55041/ijsrem42761 article EN INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 2025-03-14

It is to a huge extent the safety of civilians in any country, that country's border security system is.Constantly watching for hostile neighboring country schemes and challengers, soldiers have been assigned guard certain regions entire nationons nation are constantly monitoring challengers. Because they run risk being killed or attacked by strangers, need place alert them as well encourage stay alive. To solve this problem, proposed based on IOT ZigBee technology article keep track...

10.52783/cana.v32.4669 article EN Deleted Journal 2025-02-14

10.1109/icears64219.2025.10940686 article EN 2022 International Conference on Electronics and Renewable Systems (ICEARS) 2025-02-11

Social media influencers (SMIs) have become a key component of digital marketing, especially in industries like cosmetics, where visual appeal and personal recommendations strongly impact consumer choices. This research paper examines the influence social on online buying behavior, specifically Indian cosmetic industry. The study explores how factors such as influencer credibility, engagement levels, content authenticity, brand collaborations shape perceptions purchasing decisions. Using...

10.69889/ijlapt.v2i03(mar).106 article EN International Journal of Linguistics Applied Psychology and Technology (IJLAPT). 2025-04-05

EOL or End-of-Life electronics electronic waste e-waste describes discarded electrical devices. Used which are destined for reuse, resale, salvage, recycling, disposal also considered e-waste. Informal processing of in developing countries can lead to adverse human health effects and environmental pollution. Scrap components, such as CPUs, contain potentially harmful materials lead, cadmium, beryllium, brominates flame retardants. Recycling may involve significant risk workers communities...

10.69889/ijlapt.v2i02(feb).91 article EN cc-by-nc International Journal of Linguistics Applied Psychology and Technology (IJLAPT). 2025-03-04

10.61137/ijsret.vol.11.issue2.208 article EN International Journal of Scientific Research and Engineering Trends 2025-03-15

A study of the available approaches aimed at mitigating vulnerabilities in software development, and their applicability during compliance evaluation was carried out. Having systematized standards guidelines on development secure software, we made a list basic requirements that enables us, among other things, to assess processes for with requirements. We present an original conceptual model analysis synthesis controls which allows developers select reasonable developing software.

10.1145/2799979.2799998 article EN 2015-09-08

The work presents the original taxonomy of information security threats in software development life cycle. model an attacker acting environments is presented. proposed contains: a list sources threats, types and categories, description likely targets (motivations) attacks on attackers' potentials capabilities. A systematized during (35 threats) was proposed. Threats were classified according with cycle processes established by ISO/IEC 12207. Each threat presented using following parameters:...

10.1109/icaict.2018.8747065 article EN 2018-10-01

We briefly describe Russia's current approach to the Common Criteria-based IT-certification scheme and its state. Basic historical perspective issues are observed, as well our statistics future plans.

10.1145/2799979.2799980 article EN 2015-09-08

The problems of certification radio telecommunication hardware-software in accordance with information security requirements are discussed. situation where is being mandatory reviewed. key features certification, methodological levels and indicators the effectiveness process formulated. drawbacks modern paradigm shown. necessity shift substantiated. approaches to ensure completeness checks hardware software products on offered. results long-term statistics testing presented.

10.1109/sibcon.2015.7147139 article EN 2015-05-01

The paper discusses practical aspects of introduction the methods to detect software vulnerability in day-to-day activities accredited testing laboratory. It presents approval results detection as part study open source and that is a test object certification tests under information security requirements, including for communication networks. Results showing allocation identified vulnerabilities by types attacks, country origin, programming languages used development, detecting...

10.1088/1742-6596/1015/4/042033 article EN Journal of Physics Conference Series 2018-05-01

This paper describes the architecture of Excelsior JET, a Java optimizing environment based upon ahead-of-time compilation bytecode to platform-specific (native) code. Advantages static originate from possibility employing powerful resource-expensive optimizations resulting in much better code quality than case dynamic (just-in-time) complation implemented contemporary Virtual Machines (JVMs). Moreover, noticeable innovation JET is Mixed Compilation Model that allows compiled program load...

10.1145/584369.584387 article EN 2002-07-24

The findings of a study concerned with devising procedure for substantiated development set measures to design secure software used in automated process control systems at critical facilities are presented. Using the results systematization and consolidation standards recommendations area designing software, requirements was formulated process, which recommended implementing lifecycle (a basic software). An original suggested systems, using software.

10.1109/sibcon.2016.7491660 article EN 2016-05-01

This paper presents statistical results and their consolidation, which were received in the study into security of various web-application against cross-site request forgery attacks. Some carried out within framework certification for compliance with information requirements. The provides consolidating about attack protection measures, are currently used by developers web-applications. It specifies study, demonstrate distribution types: identified vulnerabilities as per developer type...

10.1088/1742-6596/1015/4/042034 article EN Journal of Physics Conference Series 2018-05-01

10.21681/2311-3456-2014-1-28-35 article EN Voprosy kiberbezopasnosti 2014-01-01

В работе представлены результаты систематизации мер защиты информационных ресурсов от компьютерных атак на цепи поставок программного обеспечения и программно-аппаратных комплексов. Отмечены феномены, актуальность востребованность тематики цепей поставки ИТ-продукции. Приведена статистика по заимствованным компонентам программной продукции программных Приведены примеры ресурсы процессы обеспечения. Проведен анализ существующей терминологической базы в области безопасности Сформулированы...

10.26583/bit.2019.3.06 article RU cc-by Bezopasnost informacionnyh tehnology 2019-09-01

Purpose: analysis of various techniques and for identifying defects vulnerabilities during certification tests. Research method: comparative analysis. Result: the conclusion is made about relevance priority study open-source web applications. The given shortcomings directive methods undeclared capabilities in software products are shown. author’s statistics identified with detailing by classes computer attacks, manufacturers information security tools, programming environments...

10.21681/2311-3456-2021-5-36-44 article EN Voprosy kiberbezopasnosti 2021-01-01
Coming Soon ...