- Information and Cyber Security
- Software Reliability and Analysis Research
- Advanced Data Processing Techniques
- Advanced Malware Detection Techniques
- Economic and Technological Systems Analysis
- Technology Assessment and Management
- Web Application Security Vulnerabilities
- Software Testing and Debugging Techniques
- Cybersecurity and Cyber Warfare Studies
- Legal and Policy Issues
- Security, Politics, and Digital Transformation
- Cybersecurity and Information Systems
- Digital and Cyber Forensics
- European and Russian Geopolitical Military Strategies
- Risk and Safety Analysis
- Logic, programming, and type systems
- Network Security and Intrusion Detection
- Advanced Research in Systems and Signal Processing
- Parallel Computing and Optimization Techniques
- Network Packet Processing and Optimization
- Big Data and Business Intelligence
- Vehicle License Plate Recognition
- Ancient Near East History
- Real-Time Systems Scheduling
- Optics and Image Analysis
Saveetha University
2025
B.S. Abdur Rahman Crescent Institute of Science & Technology
2024
Mother Teresa Women's University
2024
Bauman Moscow State Technical University
2016-2023
Perm National Research Polytechnic University
2018
Murmansk State Technical University
2016-2017
A.P. Ershov Institute of Informatics Systems, Siberian Branch of the Russian Academy of Sciences
2002
Institute of Informatics Problems
2002
This research proposes a novel security solution for IoT networks by integrating Practical Byzantine Fault Tolerance (PBFT) with Elliptic Curve Cryptography (ECC). The approach aims to enhance authentication, ensure data integrity, and optimize resource use in resource-constrained environments. By combining ECC's lightweight cryptographic capabilities PBFT's consensus model, the system achieves high performance, scalability, robust fault tolerance, providing secure framework communication....
It is to a huge extent the safety of civilians in any country, that country's border security system is.Constantly watching for hostile neighboring country schemes and challengers, soldiers have been assigned guard certain regions entire nationons nation are constantly monitoring challengers. Because they run risk being killed or attacked by strangers, need place alert them as well encourage stay alive. To solve this problem, proposed based on IOT ZigBee technology article keep track...
Social media influencers (SMIs) have become a key component of digital marketing, especially in industries like cosmetics, where visual appeal and personal recommendations strongly impact consumer choices. This research paper examines the influence social on online buying behavior, specifically Indian cosmetic industry. The study explores how factors such as influencer credibility, engagement levels, content authenticity, brand collaborations shape perceptions purchasing decisions. Using...
EOL or End-of-Life electronics electronic waste e-waste describes discarded electrical devices. Used which are destined for reuse, resale, salvage, recycling, disposal also considered e-waste. Informal processing of in developing countries can lead to adverse human health effects and environmental pollution. Scrap components, such as CPUs, contain potentially harmful materials lead, cadmium, beryllium, brominates flame retardants. Recycling may involve significant risk workers communities...
A study of the available approaches aimed at mitigating vulnerabilities in software development, and their applicability during compliance evaluation was carried out. Having systematized standards guidelines on development secure software, we made a list basic requirements that enables us, among other things, to assess processes for with requirements. We present an original conceptual model analysis synthesis controls which allows developers select reasonable developing software.
The work presents the original taxonomy of information security threats in software development life cycle. model an attacker acting environments is presented. proposed contains: a list sources threats, types and categories, description likely targets (motivations) attacks on attackers' potentials capabilities. A systematized during (35 threats) was proposed. Threats were classified according with cycle processes established by ISO/IEC 12207. Each threat presented using following parameters:...
We briefly describe Russia's current approach to the Common Criteria-based IT-certification scheme and its state. Basic historical perspective issues are observed, as well our statistics future plans.
The problems of certification radio telecommunication hardware-software in accordance with information security requirements are discussed. situation where is being mandatory reviewed. key features certification, methodological levels and indicators the effectiveness process formulated. drawbacks modern paradigm shown. necessity shift substantiated. approaches to ensure completeness checks hardware software products on offered. results long-term statistics testing presented.
The paper discusses practical aspects of introduction the methods to detect software vulnerability in day-to-day activities accredited testing laboratory. It presents approval results detection as part study open source and that is a test object certification tests under information security requirements, including for communication networks. Results showing allocation identified vulnerabilities by types attacks, country origin, programming languages used development, detecting...
This paper describes the architecture of Excelsior JET, a Java optimizing environment based upon ahead-of-time compilation bytecode to platform-specific (native) code. Advantages static originate from possibility employing powerful resource-expensive optimizations resulting in much better code quality than case dynamic (just-in-time) complation implemented contemporary Virtual Machines (JVMs). Moreover, noticeable innovation JET is Mixed Compilation Model that allows compiled program load...
The findings of a study concerned with devising procedure for substantiated development set measures to design secure software used in automated process control systems at critical facilities are presented. Using the results systematization and consolidation standards recommendations area designing software, requirements was formulated process, which recommended implementing lifecycle (a basic software). An original suggested systems, using software.
This paper presents statistical results and their consolidation, which were received in the study into security of various web-application against cross-site request forgery attacks. Some carried out within framework certification for compliance with information requirements. The provides consolidating about attack protection measures, are currently used by developers web-applications. It specifies study, demonstrate distribution types: identified vulnerabilities as per developer type...
В работе представлены результаты систематизации мер защиты информационных ресурсов от компьютерных атак на цепи поставок программного обеспечения и программно-аппаратных комплексов. Отмечены феномены, актуальность востребованность тематики цепей поставки ИТ-продукции. Приведена статистика по заимствованным компонентам программной продукции программных Приведены примеры ресурсы процессы обеспечения. Проведен анализ существующей терминологической базы в области безопасности Сформулированы...
Purpose: analysis of various techniques and for identifying defects vulnerabilities during certification tests. Research method: comparative analysis. Result: the conclusion is made about relevance priority study open-source web applications. The given shortcomings directive methods undeclared capabilities in software products are shown. author’s statistics identified with detailing by classes computer attacks, manufacturers information security tools, programming environments...