首页 > 最新文献

Cybersecurity: Education, Science, Technique最新文献

英文 中文
DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD 基于k -平均法的生物识别防护认证系统设计
Pub Date : 2021-06-24 DOI: 10.28925/2663-4023.2021.12.8595
Yaroslav Voznyi, Mariia Nazarkevych, V. Hrytsyk, N. Lotoshynska, Bohdana Havrysh
The method of biometric identification, designed to ensure the protection of confidential information, is considered. The method of classification of biometric prints by means of machine learning is offered. One of the variants of the solution of the problem of identification of biometric images on the basis of the k-means algorithm is given. Marked data samples were created for learning and testing processes. Biometric fingerprint data were used to establish identity. A new fingerprint scan that belongs to a particular person is compared to the data stored for that person. If the measurements match, the statement that the person has been identified is true. Experimental results indicate that the k-means method is a promising approach to the classification of fingerprints. The development of biometrics leads to the creation of security systems with a better degree of recognition and with fewer errors than the security system on traditional media. Machine learning was performed using a number of samples from a known biometric database, and verification / testing was performed with samples from the same database that were not included in the training data set. Biometric fingerprint data based on the freely available NIST Special Database 302 were used to establish identity, and the learning outcomes were shown. A new fingerprint scan that belongs to a particular person is compared to the data stored for that person. If the measurements match, the statement that the person has been identified is true. The machine learning system is built on a modular basis, by forming combinations of individual modules scikit-learn library in a python environment.
考虑采用生物特征识别的方法,以确保机密信息的保护。提出了一种基于机器学习的生物特征指纹分类方法。给出了基于k-均值算法的生物特征图像识别问题的一种解决方案。为学习和测试过程创建了标记的数据样本。使用生物特征指纹数据确定身份。一个新的指纹扫描属于一个特定的人,与该人存储的数据进行比较。如果测量结果相匹配,那么这个人已经被识别出来的说法是正确的。实验结果表明,k-均值方法是一种很有前途的指纹分类方法。生物识别技术的发展导致了比传统媒体上的安全系统具有更高识别程度和更少错误的安全系统的创建。使用来自已知生物识别数据库的大量样本进行机器学习,并使用来自同一数据库的未包含在训练数据集中的样本进行验证/测试。基于免费的NIST特殊数据库302的生物特征指纹数据被用来建立身份,并显示学习结果。一个新的指纹扫描属于一个特定的人,与该人存储的数据进行比较。如果测量结果相匹配,那么这个人已经被识别出来的说法是正确的。机器学习系统建立在模块化的基础上,通过在python环境中形成单个模块scikit-learn库的组合。
{"title":"DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD","authors":"Yaroslav Voznyi, Mariia Nazarkevych, V. Hrytsyk, N. Lotoshynska, Bohdana Havrysh","doi":"10.28925/2663-4023.2021.12.8595","DOIUrl":"https://doi.org/10.28925/2663-4023.2021.12.8595","url":null,"abstract":"The method of biometric identification, designed to ensure the protection of confidential information, is considered. The method of classification of biometric prints by means of machine learning is offered. One of the variants of the solution of the problem of identification of biometric images on the basis of the k-means algorithm is given. Marked data samples were created for learning and testing processes. Biometric fingerprint data were used to establish identity. A new fingerprint scan that belongs to a particular person is compared to the data stored for that person. If the measurements match, the statement that the person has been identified is true. Experimental results indicate that the k-means method is a promising approach to the classification of fingerprints. The development of biometrics leads to the creation of security systems with a better degree of recognition and with fewer errors than the security system on traditional media. Machine learning was performed using a number of samples from a known biometric database, and verification / testing was performed with samples from the same database that were not included in the training data set. Biometric fingerprint data based on the freely available NIST Special Database 302 were used to establish identity, and the learning outcomes were shown. A new fingerprint scan that belongs to a particular person is compared to the data stored for that person. If the measurements match, the statement that the person has been identified is true. The machine learning system is built on a modular basis, by forming combinations of individual modules scikit-learn library in a python environment.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126553743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES 密码病毒学:对有保障的信息系统的安全威胁和对抗加密病毒的措施
Pub Date : 2020-12-24 DOI: 10.28925/2663-4023.2020.10.628
Hennadii Hulak, V. Buriachok, P. Skladannyi, Lydia Kuzmenko
This paper examines the security threats to guaranteed information systems, as well as measures to combat encryption viruses. A typical sequence of cyberattacks with information encryption using software tools to implement attacks is determined. The sequence of procedures of the WannaCry encryption part is described. The paper proposes a description of the computational complexity of encrypted data recovery problems, including methods for parallelizing the solution of cryptanalysis problems, methods used to solve problems of cryptosystem stability assessment, vulnerability search and decryption depending on basic mathematical methods. The application of distributed computing technology to solve problems of recovery of encrypted resources is described. The paper states that in modern conditions of constant development of cryptography methods with a high level of stability and their wide availability a necessary condition for improving the recovery of encrypted programs - data seekers is to create a special software security monitor and build specialized multiprocessor systems to implement cryptanalysis methods with wide access of authorized users. , from the point of view of minimizing the ratio "cost - the result" the most rational approach to creating specialized multiprocessor systems is to build a cluster system based on the most powerful general-purpose computers using hardware computing accelerators based on programmable logic integrated circuits to increase the effectiveness of attacks on cryptographic software tools for the implementation of attacks, it is advisable to develop technologies for active actions in cyberspace, in particular, those that provide the formation of hidden channels.
本文探讨了安全保障信息系统面临的安全威胁,以及防范加密病毒的措施。确定了利用软件工具进行信息加密的网络攻击的典型序列。介绍了WannaCry加密部分的步骤顺序。本文描述了加密数据恢复问题的计算复杂度,包括并行求解密码分析问题的方法、基于基本数学方法解决密码系统稳定性评估、漏洞搜索和解密问题的方法。介绍了分布式计算技术在解决加密资源恢复问题中的应用。本文指出,在稳定性高、可用性广的密码方法不断发展的现代条件下,提高加密程序-数据搜索器的恢复能力的必要条件是创建专门的软件安全监视器和构建专门的多处理器系统来实现授权用户广泛访问的密码分析方法。从最小化“成本-结果”比率的角度出发,创建专用多处理器系统最合理的方法是在最强大的通用计算机基础上构建集群系统,使用基于可编程逻辑集成电路的硬件计算加速器,以增加攻击的有效性,对加密软件工具实施攻击,建议开发网络空间主动行动技术。特别是那些提供隐蔽通道形成的。
{"title":"CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES","authors":"Hennadii Hulak, V. Buriachok, P. Skladannyi, Lydia Kuzmenko","doi":"10.28925/2663-4023.2020.10.628","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.10.628","url":null,"abstract":"This paper examines the security threats to guaranteed information systems, as well as measures to combat encryption viruses. A typical sequence of cyberattacks with information encryption using software tools to implement attacks is determined. The sequence of procedures of the WannaCry encryption part is described. The paper proposes a description of the computational complexity of encrypted data recovery problems, including methods for parallelizing the solution of cryptanalysis problems, methods used to solve problems of cryptosystem stability assessment, vulnerability search and decryption depending on basic mathematical methods. The application of distributed computing technology to solve problems of recovery of encrypted resources is described. The paper states that in modern conditions of constant development of cryptography methods with a high level of stability and their wide availability a necessary condition for improving the recovery of encrypted programs - data seekers is to create a special software security monitor and build specialized multiprocessor systems to implement cryptanalysis methods with wide access of authorized users. , from the point of view of minimizing the ratio \"cost - the result\" the most rational approach to creating specialized multiprocessor systems is to build a cluster system based on the most powerful general-purpose computers using hardware computing accelerators based on programmable logic integrated circuits to increase the effectiveness of attacks on cryptographic software tools for the implementation of attacks, it is advisable to develop technologies for active actions in cyberspace, in particular, those that provide the formation of hidden channels.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114353518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MODEL OF CURRENT RISK INDICATOR OF IMPLEMENTATION OF THREATS TO INFORMATION AND COMMUNICATION SYSTEMS 对信息和通信系统实施威胁的当前风险指标模型
Pub Date : 2020-12-24 DOI: 10.28925/2663-4023.2020.10.113122
V. Lakhno, A. Blozva, Maksym Misiura, D. Kasatkin, B. Gusev
The article proposes a model for estimating the quantitative indicator of current risks of threats and cyber attacks on transport information and communication systems (TICS). The model differs from the existing one in taking into account the degree of impact of each threat or cyber attack within the class on the probability of an accident that occurs during cyberattacks on components of transport information and communication systems, which in many cases can be attributed to critical computer systems. It is shown that the current risks may be insignificant if all potentially dangerous parameters of transport information and communication systems are maintained within the established limits, or increase, becoming threatening, when such parameters deviate from the norm. The necessity to describe the degree of current danger of risks of threats and cyberattacks with the help of some quantitative indicator is substantiated. The value of this indicator may depend on the deviations of the parameters related to the cyber security of information and communication systems of transport. An appropriate calculation formula is proposed to determine the current risk of the threat to information and communication systems of transport. To test the proposed model, a simulation experiment was conducted, the results of which are also presented in the article. Simulation modeling was also performed to verify the adequacy of the proposed model and the algorithm for estimating the current risk indicator for components of transport information and communication systems. It is taken into account that many components of transport information and communication systems work in real time. It is shown that the proposed model takes into account the current values of information security metrics and new classes of cyber threats for transport information and communication systems.
本文提出了一个模型,用于估计交通信息和通信系统(TICS)当前威胁和网络攻击风险的定量指标。该模型与现有模型的不同之处在于,它考虑了类别内的每个威胁或网络攻击对运输信息和通信系统组件遭受网络攻击期间发生事故的概率的影响程度,在许多情况下,这些攻击可归因于关键计算机系统。结果表明,如果运输信息和通信系统的所有潜在危险参数保持在规定的范围内,则目前的风险可能微不足道,或者当这些参数偏离标准时,这些参数会增加并变得具有威胁性。有必要借助一些量化指标来描述当前威胁和网络攻击风险的危险程度。该指标的值可能取决于与运输信息和通信系统的网络安全有关的参数的偏差。提出了一个适当的计算公式,以确定当前对运输信息和通信系统的威胁的风险。为了验证所提出的模型,进行了仿真实验,并给出了实验结果。仿真建模还验证了所提出的模型和算法的充分性,以估计运输信息和通信系统组件的当前风险指标。考虑到运输信息和通信系统的许多组成部分是实时工作的。结果表明,所提出的模型考虑了信息安全指标的当前值以及运输信息和通信系统的新网络威胁类别。
{"title":"MODEL OF CURRENT RISK INDICATOR OF IMPLEMENTATION OF THREATS TO INFORMATION AND COMMUNICATION SYSTEMS","authors":"V. Lakhno, A. Blozva, Maksym Misiura, D. Kasatkin, B. Gusev","doi":"10.28925/2663-4023.2020.10.113122","DOIUrl":"https://doi.org/10.28925/2663-4023.2020.10.113122","url":null,"abstract":"The article proposes a model for estimating the quantitative indicator of current risks of threats and cyber attacks on transport information and communication systems (TICS). The model differs from the existing one in taking into account the degree of impact of each threat or cyber attack within the class on the probability of an accident that occurs during cyberattacks on components of transport information and communication systems, which in many cases can be attributed to critical computer systems. It is shown that the current risks may be insignificant if all potentially dangerous parameters of transport information and communication systems are maintained within the established limits, or increase, becoming threatening, when such parameters deviate from the norm. The necessity to describe the degree of current danger of risks of threats and cyberattacks with the help of some quantitative indicator is substantiated. The value of this indicator may depend on the deviations of the parameters related to the cyber security of information and communication systems of transport. An appropriate calculation formula is proposed to determine the current risk of the threat to information and communication systems of transport. To test the proposed model, a simulation experiment was conducted, the results of which are also presented in the article. Simulation modeling was also performed to verify the adequacy of the proposed model and the algorithm for estimating the current risk indicator for components of transport information and communication systems. It is taken into account that many components of transport information and communication systems work in real time. It is shown that the proposed model takes into account the current values of information security metrics and new classes of cyber threats for transport information and communication systems.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126356623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MODEL FOR SUPPORTING DECISIONS OF A GROUP OF A SMART CITY PROJECT INVESTORS, TAKING INTO CONSIDERATION MULTIFACTORIALITY 考虑多因素因素的智慧城市项目投资者群体决策支持模型
Pub Date : 2019-12-26 DOI: 10.28925/2663-4023.2019.6.5770
V. Lakhno, Volodymyr Malukov, D. Kasatkin, A. Blozva, T. Litovchenko
Creating a multi-factor decision support model for a group of investors for Smart City development. The article describes the method of using of the mathematical decision support model in the evaluation of investment projects. The results are based on the decision of a bilinear multi-step quality game with several terminal surfaces. The model is focused on further software implementation of the decision support system (DSS) or expert system for cross-platform software products. In doing so, players control a dynamic system in multidimensional project spaces. The scientific novelty of the article is that, in contrast to the existing solutions and close to the conceptual focus of research, in the article, for the first time we consider a new class of bilinear multiplayer games. For the first time, we have proposed a solution that allows us to appropriately and correctly describe the investment processes, considering the multifactorial nature of the problem. Computational experiments were performed in MatLab to find sets, investor preferences, and their optimal financial strategies in the analysis of Smart City development projects. The results of the computational experiments confirmed the correctness and capability of the model. In terms of practical importance, the scope of investing in Smart City development projects is considered, given the multifactorial nature of the task and the potential financial strategies of investor groups. The model makes it possible to evaluate the attractiveness for the investor groups (players) of the projects being analyzed.
为智慧城市发展的一组投资者创建多因素决策支持模型。本文介绍了数学决策支持模型在投资项目评价中的应用方法。结果是基于具有多个终端面的双线性多步质量博弈的决策。该模型关注于跨平台软件产品的决策支持系统(DSS)或专家系统的进一步软件实现。这样,玩家就可以控制多维项目空间中的动态系统。这篇文章的科学新颖之处在于,与现有的解决方案相比,在这篇文章中,我们首次考虑了一类新的双线性多人游戏。考虑到问题的多因素性质,我们第一次提出了一个解决方案,使我们能够适当和正确地描述投资过程。在MatLab中进行计算实验,寻找智慧城市发展项目分析中的集合、投资者偏好及其最优财务策略。计算实验结果验证了该模型的正确性和有效性。就实际重要性而言,考虑到任务的多因素性质和投资者群体潜在的财务策略,考虑了投资智慧城市发展项目的范围。该模型使评估所分析项目对投资者群体(参与者)的吸引力成为可能。
{"title":"MODEL FOR SUPPORTING DECISIONS OF A GROUP OF A SMART CITY PROJECT INVESTORS, TAKING INTO CONSIDERATION MULTIFACTORIALITY","authors":"V. Lakhno, Volodymyr Malukov, D. Kasatkin, A. Blozva, T. Litovchenko","doi":"10.28925/2663-4023.2019.6.5770","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.5770","url":null,"abstract":"Creating a multi-factor decision support model for a group of investors for Smart City development. The article describes the method of using of the mathematical decision support model in the evaluation of investment projects. The results are based on the decision of a bilinear multi-step quality game with several terminal surfaces. The model is focused on further software implementation of the decision support system (DSS) or expert system for cross-platform software products. In doing so, players control a dynamic system in multidimensional project spaces. The scientific novelty of the article is that, in contrast to the existing solutions and close to the conceptual focus of research, in the article, for the first time we consider a new class of bilinear multiplayer games. For the first time, we have proposed a solution that allows us to appropriately and correctly describe the investment processes, considering the multifactorial nature of the problem. Computational experiments were performed in MatLab to find sets, investor preferences, and their optimal financial strategies in the analysis of Smart City development projects. The results of the computational experiments confirmed the correctness and capability of the model. In terms of practical importance, the scope of investing in Smart City development projects is considered, given the multifactorial nature of the task and the potential financial strategies of investor groups. The model makes it possible to evaluate the attractiveness for the investor groups (players) of the projects being analyzed.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129265807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GETTING AND PROCESSING GEOPRODITIONAL DATA WITH MATLAB MAPPING TOOLBOX 利用matlab绘图工具箱获取和处理地理数据
Pub Date : 2019-12-26 DOI: 10.28925/2663-4023.2019.6.94104
Banovsha Mekhdiyeva, Guluzade Rustam, L. Ivanova, Natalia Korshun, P. Skladannyi
The article considers the problems of providing water, necessary for the needs of the population and the national economy on a global scale and for Azerbaijan in particular. One of the means for the accumulation and storage of water are artificial reservoirs formed, as a rule, in the river valley by water-supporting structures for the accumulation and storage of water for the purpose of its use in the national economy. The main parameters of reservoirs are considered in the article, such as: volume, area of the mirror and the amplitude of fluctuations in water levels in the conditions of their operation, as well as modes of their operation, which became the basis for constructing a mathematical model of the cascade reservoir, which reliably describes the hydrological processes that take place in the reservoirs. Monitoring the status of reservoirs will allow to plan activities, simulate the situation that may arise in other reservoirs that make up the cascade, and make forecasts. The article presents a data processing model in the MATLAB application development environment, which is one of the most popular software in the world. The model is based on the method of calculating differential indices based on multispectral data. Having a large number of additions to the main program in the form of toolboxes, or sets of specialized tools, makes it possible to apply MATLAB in a wide variety of areas of programming. The Mapping Toolbox is specifically designed to leverage MATLAB's richest geospatial capabilities. This article shows how to use Mapping Toolbox tools at all stages of working - from receiving and importing into the workspace of the program, processing and further outputting results in the form of files or finished electronic maps. The task of identifying and mapping the hydrological objects that make up the cascade of reservoirs on the largest waterway in Azerbaijan - the Kura River - was chosen as an example.
这篇文章考虑了提供水的问题,这是全球范围内,特别是阿塞拜疆人口和国民经济需要所必需的。蓄水和储水的手段之一是人工水库,通常在河谷中由支撑水的结构形成,以蓄水和储水供国民经济使用。本文考虑了水库的主要参数,如:水库运行条件下的容积、镜面面积、水位波动幅度及运行方式,为建立梯级水库的数学模型奠定了基础,该模型可靠地描述了水库中发生的水文过程。监测水库的状态将有助于规划活动,模拟构成级联的其他水库可能出现的情况,并作出预测。本文介绍了在世界上最流行的软件之一MATLAB应用程序开发环境下的数据处理模型。该模型基于基于多光谱数据的差分指数计算方法。以工具箱或专用工具集的形式对主程序进行大量添加,使得MATLAB可以在各种编程领域中应用。Mapping Toolbox是专门为利用MATLAB最丰富的地理空间功能而设计的。本文展示了如何在工作的各个阶段使用Mapping Toolbox工具——从接收和导入程序的工作空间,到处理和进一步以文件或成品电子地图的形式输出结果。在阿塞拜疆最大的水道- -库拉河- -确定和绘制构成水库梯级的水文对象的任务被选为一个例子。
{"title":"GETTING AND PROCESSING GEOPRODITIONAL DATA WITH MATLAB MAPPING TOOLBOX","authors":"Banovsha Mekhdiyeva, Guluzade Rustam, L. Ivanova, Natalia Korshun, P. Skladannyi","doi":"10.28925/2663-4023.2019.6.94104","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.94104","url":null,"abstract":"The article considers the problems of providing water, necessary for the needs of the population and the national economy on a global scale and for Azerbaijan in particular. One of the means for the accumulation and storage of water are artificial reservoirs formed, as a rule, in the river valley by water-supporting structures for the accumulation and storage of water for the purpose of its use in the national economy. The main parameters of reservoirs are considered in the article, such as: volume, area of the mirror and the amplitude of fluctuations in water levels in the conditions of their operation, as well as modes of their operation, which became the basis for constructing a mathematical model of the cascade reservoir, which reliably describes the hydrological processes that take place in the reservoirs. Monitoring the status of reservoirs will allow to plan activities, simulate the situation that may arise in other reservoirs that make up the cascade, and make forecasts. The article presents a data processing model in the MATLAB application development environment, which is one of the most popular software in the world. The model is based on the method of calculating differential indices based on multispectral data. Having a large number of additions to the main program in the form of toolboxes, or sets of specialized tools, makes it possible to apply MATLAB in a wide variety of areas of programming. The Mapping Toolbox is specifically designed to leverage MATLAB's richest geospatial capabilities. This article shows how to use Mapping Toolbox tools at all stages of working - from receiving and importing into the workspace of the program, processing and further outputting results in the form of files or finished electronic maps. The task of identifying and mapping the hydrological objects that make up the cascade of reservoirs on the largest waterway in Azerbaijan - the Kura River - was chosen as an example.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116728952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SECURITY OF DATA TRANSFER TO THE INTERNET OF THINGS 数据传输到物联网的安全性
Pub Date : 2019-12-26 DOI: 10.28925/2663-4023.2019.6.618
Belej Olexander, Lohutova Tamara
The article discusses the MQTT protocol for the Internet of Things and touch wireless networks, its features, applications, and specific procedures. The information elements and principles of the message owner are analyzed. This article covers topics such as secure storage of the Internet of Things, the transfer of that data through the secure interface of mobile devices and web applications. It also looks at all the key tools provided by MQTT for information security. The proposed identification of users in this article is to identify them from the Cloudant database. This application works on the Node.js server in IBM Bluemix and provides an API or RESTful that requires mobile client authentication. The mobile client access service is designed to call these two APIs in any authentication application. It is suggested to use separate authentication approaches: for the web application - on the Cloud Directory and for the mobile application - MobileFirst Client Access. However, both the web and mobile applications use the same level of application security to allow the user to access device data. To improve the security of messages, it is suggested to use a transport layer security protocol that uses different cryptographic methods. We are offered homomorphic encryption of these protocols. The transport layer security protocol increases the performance of the protocol and reduces the computational cost, but it does not apply when initially connecting to the server or when a previous session has already expired. The article presents an algorithm for the detection of weak symmetry breaking for the analysis of the chance of a recovered e-mail. A method of homomorphic encryption and authentication of users and their emails in wireless sensor networks of the Internet of Things is proposed.
本文讨论了用于物联网和触摸无线网络的MQTT协议、其特性、应用程序和具体过程。分析了消息所有者的信息构成要素和原则。本文涵盖了物联网的安全存储、通过移动设备和web应用程序的安全接口传输数据等主题。本文还介绍了MQTT为信息安全提供的所有关键工具。本文中建议的用户标识是从Cloudant数据库中标识用户。此应用程序在IBM Bluemix中的Node.js服务器上工作,并提供需要移动客户端身份验证的API或RESTful。移动客户端访问服务被设计为在任何身份验证应用程序中调用这两个api。建议使用单独的身份验证方法:对于web应用程序-在云目录上,对于移动应用程序- MobileFirst客户端访问。但是,web和移动应用程序都使用相同级别的应用程序安全来允许用户访问设备数据。为了提高消息的安全性,建议使用使用不同加密方法的传输层安全协议。我们提供了这些协议的同态加密。传输层安全协议提高了协议的性能并减少了计算成本,但在最初连接到服务器或之前的会话已经过期时,它并不适用。本文提出了一种检测弱对称性破缺的算法,用于分析电子邮件恢复的可能性。提出了一种物联网无线传感器网络中用户及其电子邮件的同态加密与认证方法。
{"title":"SECURITY OF DATA TRANSFER TO THE INTERNET OF THINGS","authors":"Belej Olexander, Lohutova Tamara","doi":"10.28925/2663-4023.2019.6.618","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.618","url":null,"abstract":"The article discusses the MQTT protocol for the Internet of Things and touch wireless networks, its features, applications, and specific procedures. The information elements and principles of the message owner are analyzed. This article covers topics such as secure storage of the Internet of Things, the transfer of that data through the secure interface of mobile devices and web applications. It also looks at all the key tools provided by MQTT for information security. The proposed identification of users in this article is to identify them from the Cloudant database. This application works on the Node.js server in IBM Bluemix and provides an API or RESTful that requires mobile client authentication. The mobile client access service is designed to call these two APIs in any authentication application. It is suggested to use separate authentication approaches: for the web application - on the Cloud Directory and for the mobile application - MobileFirst Client Access. However, both the web and mobile applications use the same level of application security to allow the user to access device data. To improve the security of messages, it is suggested to use a transport layer security protocol that uses different cryptographic methods. We are offered homomorphic encryption of these protocols. The transport layer security protocol increases the performance of the protocol and reduces the computational cost, but it does not apply when initially connecting to the server or when a previous session has already expired. The article presents an algorithm for the detection of weak symmetry breaking for the analysis of the chance of a recovered e-mail. A method of homomorphic encryption and authentication of users and their emails in wireless sensor networks of the Internet of Things is proposed.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120973094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SELECTION OF AGGREGATION OPERATORS FOR A MULTI-CRITERIA EVALUTION OF SUTABILITY OF TERRITORIES 区域适宜性多准则评价中聚合算子的选择
Pub Date : 2019-12-26 DOI: 10.28925/2663-4023.2019.6.4656
S. Kuznichenko, I. Buchynska
The article discusses the issues of improving the adequacy and validity of the results of the convolution of criteria evaluation into a generalized evaluation when conducting a multi-criteria analysis of the land suitability  by choosing the appropriate type of aggregation operator that can be performed in the GIS environment and has the properties that allow the most complete formalization of expert knowledge about the features of this applied area. Based on the analysis of the causes of the fuzziness of information in multicriteria decision-making models, the properties that the aggregation operator must have are formulated. A comparative analysis of various aggregation operators for the construction of complex maps of the suitability of territories is carried out. The features of the execution of aggregation operators are investigated: minimum, maximum, arithmetic mean, weighted sum, OWA Yager operator. It is shown that the most justified choice is to use the OWA Yager operator with fuzzy quantifiers, which allows you to provide expert information on the acceptable form of a compromise between evalutions by individual criteria. The use a family of the RIM quantifiers to formalize the attitude of DM to risk in making decisions is proposed. An example of the use of the OWA Yager operator with fuzzy quantifiers for calculating the convolution of criteria evalutions is given. It is shown that the Yager OWA operator with fuzzy quantifiers is a universal aggregation operator, since it has the ability to implement a wide range of decision-making strategies: from  minimum operator to maximum operator.
本文讨论了在对土地适宜性进行多标准分析时,通过选择适当类型的聚合算子来提高标准评估卷积结果的充分性和有效性的问题,这些聚合算子可以在GIS环境中执行,并且具有允许对该应用区域的特征进行最完整形式化的专家知识的属性。在分析多准则决策模型中信息模糊性产生原因的基础上,提出了聚合算子必须具备的属性。比较分析了各种聚合算子用于构建复杂的领土适宜性地图。研究了聚合算子的执行特征:最小、最大、算术平均、加权和、OWA Yager算子。结果表明,最合理的选择是使用带有模糊量词的OWA Yager操作符,它允许您提供关于根据各个标准的评估之间折衷的可接受形式的专家信息。提出了一组RIM量词来形式化决策者在决策中对风险的态度。给出了一个使用带有模糊量词的OWA Yager算子计算准则评价卷积的例子。结果表明,带有模糊量词的Yager OWA算子是一种通用的聚合算子,因为它能够实现从最小算子到最大算子的各种决策策略。
{"title":"SELECTION OF AGGREGATION OPERATORS FOR A MULTI-CRITERIA EVALUTION OF SUTABILITY OF TERRITORIES","authors":"S. Kuznichenko, I. Buchynska","doi":"10.28925/2663-4023.2019.6.4656","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.6.4656","url":null,"abstract":"The article discusses the issues of improving the adequacy and validity of the results of the convolution of criteria evaluation into a generalized evaluation when conducting a multi-criteria analysis of the land suitability  by choosing the appropriate type of aggregation operator that can be performed in the GIS environment and has the properties that allow the most complete formalization of expert knowledge about the features of this applied area. Based on the analysis of the causes of the fuzziness of information in multicriteria decision-making models, the properties that the aggregation operator must have are formulated. A comparative analysis of various aggregation operators for the construction of complex maps of the suitability of territories is carried out. The features of the execution of aggregation operators are investigated: minimum, maximum, arithmetic mean, weighted sum, OWA Yager operator. It is shown that the most justified choice is to use the OWA Yager operator with fuzzy quantifiers, which allows you to provide expert information on the acceptable form of a compromise between evalutions by individual criteria. The use a family of the RIM quantifiers to formalize the attitude of DM to risk in making decisions is proposed. An example of the use of the OWA Yager operator with fuzzy quantifiers for calculating the convolution of criteria evalutions is given. It is shown that the Yager OWA operator with fuzzy quantifiers is a universal aggregation operator, since it has the ability to implement a wide range of decision-making strategies: from  minimum operator to maximum operator.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114768112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CRITERIA FOR MONITORING THE RELIABILITY OF INFORMATION IN THE INFORMATION SPACE 信息空间中信息可靠性监测标准
Pub Date : 2019-09-26 DOI: 10.28925/2663-4023.2019.5.5260
Z. Brzhevska, N. Dovzhenko, H. Haidur, Andriy O. Anosov
This article is about criteria of reliability of information. The validity period of the informationhas been determined. It is established that an important stage of selection, development ofmethods and mechanisms for ensuring the reliability of information is the analysis of theprocesses of its processing. The definition of the information reliability assessment is given, and itis also established that the complexity of the information reliability assessment is informationevaluation. To assess the accuracy of information, such features as the doubtfulness of the factspresented, the emotional coloring of the content, the tone of the content in relation to an object or event, the sensational content, the hidden content. These features will be based on monitoring thereliability of information in the information space, which aims to minimize the subjectivity ofpeer review of the content of authors from the point of view of their influential orientationtowards individuals of the information space. In order to minimize this subjectivism, the basis ofevaluations is the key criteria for the reliability of information, which, unlike estimates, arelargely fully measured: the criterion of balance of information, the criterion for separating factsfrom opinions, the criterion for the accuracy and reliability of information, the criterion forcompleteness of information. Thus, there is a need to create an algorithm for assessing thereliability of information in the information space, which makes it possible to investigateinformation resources for the impact on them, identify problems of information security in atimely manner, recommend proven solutions for use at critical sites, organize and to carry outspecial trainings at the state level, etc.
这篇文章是关于信息可靠性的标准。信息的有效期已经确定。确定了选择、开发确保信息可靠性的方法和机制的重要阶段是对信息处理过程的分析。给出了信息可靠性评估的定义,确定了信息可靠性评估的复杂性是信息评估。为了评估信息的准确性,这些特征包括所呈现事实的怀疑性、内容的情感色彩、与物体或事件相关的内容的语气、煽情的内容、隐藏的内容。这些特征将基于对信息空间中信息可靠性的监测,其目的是从作者对信息空间中个人的影响取向的角度出发,最大限度地减少同行评议作者内容的主观性。为了尽量减少这种主观主义,评估的基础是信息可靠性的关键标准,这与估计不同,它在很大程度上是充分衡量的:信息平衡的标准,将事实与意见分开的标准,信息的准确性和可靠性的标准,信息的完整性的标准。因此,有必要创建一种算法来评估信息空间中信息的可靠性,从而有可能调查信息资源对它们的影响,及时识别信息安全问题,推荐在关键站点使用的经过验证的解决方案,组织和开展国家一级的专门培训等。
{"title":"CRITERIA FOR MONITORING THE RELIABILITY OF INFORMATION IN THE INFORMATION SPACE","authors":"Z. Brzhevska, N. Dovzhenko, H. Haidur, Andriy O. Anosov","doi":"10.28925/2663-4023.2019.5.5260","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.5.5260","url":null,"abstract":"This article is about criteria of reliability of information. The validity period of the information\u0000has been determined. It is established that an important stage of selection, development of\u0000methods and mechanisms for ensuring the reliability of information is the analysis of the\u0000processes of its processing. The definition of the information reliability assessment is given, and it\u0000is also established that the complexity of the information reliability assessment is information\u0000evaluation. To assess the accuracy of information, such features as the doubtfulness of the facts\u0000presented, the emotional coloring of the content, the tone of the content in relation to an object or event, the sensational content, the hidden content. These features will be based on monitoring the\u0000reliability of information in the information space, which aims to minimize the subjectivity of\u0000peer review of the content of authors from the point of view of their influential orientation\u0000towards individuals of the information space. In order to minimize this subjectivism, the basis of\u0000evaluations is the key criteria for the reliability of information, which, unlike estimates, are\u0000largely fully measured: the criterion of balance of information, the criterion for separating facts\u0000from opinions, the criterion for the accuracy and reliability of information, the criterion for\u0000completeness of information. Thus, there is a need to create an algorithm for assessing the\u0000reliability of information in the information space, which makes it possible to investigate\u0000information resources for the impact on them, identify problems of information security in a\u0000timely manner, recommend proven solutions for use at critical sites, organize and to carry out\u0000special trainings at the state level, etc.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124900417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 3 定义在混合威胁条件下发展信息安全概念的需求。第3部分
Pub Date : 2019-07-30 DOI: 10.28925/2663-4023.2019.5.6172
Yurii Borsukovskyi
This article provides the modern cybersecurity trends directly related to aim ant tasks of criminals. It reflect the assessment of global technological risks discussed at 2020 World Economic Forum. The article covers estimations on increase on negative impact of geopolitical sharpness elements on economic potential of next generation technologies. Data fraud and cyberattacks are considered as priority key indicators at assessment of the most possible global risks, and attacks at informational infrastructure are equal to the cyberattacks risks at the rating of the most possible risks. Forecast indicates that cyberattacks are the most likely to be used as indirect conflicts between countries which look forward to expand their range on influence. In such situation the cybersecurity issues can`t stay on the second place or be the issues which should be solved at existence of direct cyber threats to the modern informational systems, IoT systems and SCADA. Obviously, we should revise the approaches to creation and development of modern informational technologies and cybersecurity issues should be considered as constituent element in development of modern informational systems from the very moment of its initiation, projecting, and on all stages of production and support. Reorientation of informational system developers to creation of new integrated platforms with cybersecurity constituent elements demands the research and implementation of new approaches to its development, as well as engagement of the world community at elaboration of relevant standards and protocols, which ensure the secure functioning of informational systems at world net. The article provides the basic requirements to constituent elements at development of concept of informational and cyber security in conditions of hybrid threats especially provides recommendations on organizational structure for informational security department and general principles to organize the activities and controls on informational and cyber protection. The article defines tasks for informational security department, provides the list of basic actions to secure information, and formulates the tasks, which should be ensured by technical infrastructure, organizational, procedural and hardware and technical actions to manage the informational security, and other principles to ensure informational security in development of concept of informational security within the hybrid threats conditions.
本文提供了与犯罪分子的目标任务直接相关的现代网络安全趋势。它反映了2020年世界经济论坛讨论的全球技术风险评估。本文涵盖了对地缘政治尖锐因素对下一代技术经济潜力的负面影响增加的估计。在最可能的全球风险评估中,数据欺诈和网络攻击被视为优先关键指标,在最可能的风险评级中,对信息基础设施的攻击等同于网络攻击风险。预测表明,网络攻击最有可能被用作希望扩大其影响范围的国家之间的间接冲突。在这种情况下,网络安全问题不能停留在第二位,也不能成为现代信息系统、物联网系统和SCADA存在直接网络威胁时应该解决的问题。显然,我们应该修改现代信息技术的创造和发展方法,网络安全问题应从现代信息系统的启动,投射以及生产和支持的各个阶段开始被视为现代信息系统发展的组成要素。信息系统开发者的重新定位是创建具有网络安全组成要素的新集成平台,这需要研究和实施其发展的新方法,以及国际社会参与制定相关标准和协议,以确保世界网络信息系统的安全运行。本文提出了在混合威胁条件下信息和网络安全概念发展对构成要素的基本要求,特别是对信息安全部门的组织结构和组织信息和网络保护活动和控制的一般原则提出了建议。文章明确了信息安全部门的任务,给出了信息安全的基本行动清单,并在信息安全概念发展的混合威胁条件下,制定了技术基础设施、组织、程序和硬件、管理信息安全的技术行动等确保信息安全的任务,以及确保信息安全的原则。
{"title":"DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 3","authors":"Yurii Borsukovskyi","doi":"10.28925/2663-4023.2019.5.6172","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.5.6172","url":null,"abstract":"This article provides the modern cybersecurity trends directly related to aim ant tasks of criminals. It reflect the assessment of global technological risks discussed at 2020 World Economic Forum. The article covers estimations on increase on negative impact of geopolitical sharpness elements on economic potential of next generation technologies. Data fraud and cyberattacks are considered as priority key indicators at assessment of the most possible global risks, and attacks at informational infrastructure are equal to the cyberattacks risks at the rating of the most possible risks. Forecast indicates that cyberattacks are the most likely to be used as indirect conflicts between countries which look forward to expand their range on influence. In such situation the cybersecurity issues can`t stay on the second place or be the issues which should be solved at existence of direct cyber threats to the modern informational systems, IoT systems and SCADA. Obviously, we should revise the approaches to creation and development of modern informational technologies and cybersecurity issues should be considered as constituent element in development of modern informational systems from the very moment of its initiation, projecting, and on all stages of production and support. Reorientation of informational system developers to creation of new integrated platforms with cybersecurity constituent elements demands the research and implementation of new approaches to its development, as well as engagement of the world community at elaboration of relevant standards and protocols, which ensure the secure functioning of informational systems at world net. The article provides the basic requirements to constituent elements at development of concept of informational and cyber security in conditions of hybrid threats especially provides recommendations on organizational structure for informational security department and general principles to organize the activities and controls on informational and cyber protection. The article defines tasks for informational security department, provides the list of basic actions to secure information, and formulates the tasks, which should be ensured by technical infrastructure, organizational, procedural and hardware and technical actions to manage the informational security, and other principles to ensure informational security in development of concept of informational security within the hybrid threats conditions.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125366163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
METHOD OF PROTECTION OF MATERIAL INFORMATION CARRIED OUT BY LATENT ELEMENTS 潜在分子对重要信息的保护方法
Pub Date : 2019-03-28 DOI: 10.28925/2663-4023.2019.3.2741
M. Nazarkevych, Yaroslav Voznyi
The method of protection of latent elements for the printed documents at the stage of preprint preparation with the further withdrawal of printing forms and prints is developed. The choice of the minimum thickness of lines for the offset printing method is substantiated. The measurements of the relative size of the raster point, optical light shrinkage when printed on different papers are studied using the Sheberstov-Murray-Davis formula. The study of the properties of fifteen paper models used for printing and their densitometric indices, which influence the quality of printing, are shown. The comparison of thin lines with offset printing and office equipment, which uses the method of printing an electrophotography, is carried out. Digital protective latent elements are developed. A graphical way of protecting printed documents is created by creating hidden images when choosing high resolution lines. The method of protection is that for the protective elements, the displacement of the part of the lines of the raster is formed by half the size of the step of the raster lines. Improved latent element protection by overlaying fractal nets, which makes it possible to create graphic traps. The printing of developed protective elements on paper models has been investigated. Protective items are printed on Heidelberg offset printing machine. From the prints there are made copies which, compared with the originals, using the method of pixel comparisons of the signal-to-noise ratio, the results of comparing the originals among themselves, the originals and their copies are presented in this paper. Experimental research was conducted on the basis of the Full Pixel Comparison (PSNR) method of the original of the protective element printed on the offset machine with the original, and the original with its copy. On the basis of researches the reliability of documents is established. Also compare the originals of documents among themselves.
本文提出了在印前准备阶段对印刷文件进行潜在因素保护的方法,并提出了进一步撤回印刷表格和印刷品的方法。对胶印法最小线厚的选择进行了论证。利用Sheberstov-Murray-Davis公式,研究了不同纸张上印刷时光栅点的相对尺寸、光学光收缩率。对15种印刷用纸张模型的性能及其影响印刷质量的密度指标进行了研究。对胶印和使用电子照相方法的办公设备的细线进行了比较。数码保护潜影元件研制成功。通过在选择高分辨率线条时创建隐藏图像,创建了保护打印文档的图形方式。保护的方法是,对于保护元件,栅格线的部分的位移由栅格线的步长大小的一半形成。通过覆盖分形网改进潜在元素保护,使创建图形陷阱成为可能。研究了开发的保护元件在纸模型上的印刷。保护性物品是在海德堡胶印机上印刷的。本文采用信噪比像素比较的方法,从印本中提取了复制品,并与原件进行了比较,给出了原作之间、原作与复制品之间的比较结果。采用全像素比对(PSNR)方法对胶印机上印刷的保护元件原件与原件、原件与复印件进行了实验研究。在研究的基础上,建立了文献的可靠性。还要对文件的原件进行比较。
{"title":"METHOD OF PROTECTION OF MATERIAL INFORMATION CARRIED OUT BY LATENT ELEMENTS","authors":"M. Nazarkevych, Yaroslav Voznyi","doi":"10.28925/2663-4023.2019.3.2741","DOIUrl":"https://doi.org/10.28925/2663-4023.2019.3.2741","url":null,"abstract":"The method of protection of latent elements for the printed documents at the stage of preprint preparation with the further withdrawal of printing forms and prints is developed. The choice of the minimum thickness of lines for the offset printing method is substantiated. The measurements of the relative size of the raster point, optical light shrinkage when printed on different papers are studied using the Sheberstov-Murray-Davis formula. The study of the properties of fifteen paper models used for printing and their densitometric indices, which influence the quality of printing, are shown. The comparison of thin lines with offset printing and office equipment, which uses the method of printing an electrophotography, is carried out. Digital protective latent elements are developed. A graphical way of protecting printed documents is created by creating hidden images when choosing high resolution lines. The method of protection is that for the protective elements, the displacement of the part of the lines of the raster is formed by half the size of the step of the raster lines. Improved latent element protection by overlaying fractal nets, which makes it possible to create graphic traps. The printing of developed protective elements on paper models has been investigated. Protective items are printed on Heidelberg offset printing machine. From the prints there are made copies which, compared with the originals, using the method of pixel comparisons of the signal-to-noise ratio, the results of comparing the originals among themselves, the originals and their copies are presented in this paper. Experimental research was conducted on the basis of the Full Pixel Comparison (PSNR) method of the original of the protective element printed on the offset machine with the original, and the original with its copy. On the basis of researches the reliability of documents is established. Also compare the originals of documents among themselves.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128025419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Cybersecurity: Education, Science, Technique
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1