A blockchain decentralized public key infrastructure model AS Konoplev, AG Busygin, DP Zegzhda Automatic Control and Computer Sciences 52, 1017-1021, 2018 | 22 | 2018 |
Providing stable operation of self-organizing cyber-physical system via adaptive topology management methods using blockchain-like directed acyclic graph AG Busygin, AS Konoplev, DP Zegzhda Automatic control and computer sciences 52, 1080-1083, 2018 | 14 | 2018 |
Floating genesis block enhancement for blockchain based routing between connected vehicles and software-defined VANET security services A Busygin, A Konoplev, M Kalinin, D Zegzhda Proceedings of the 11th International Conference on Security of Information …, 2018 | 14 | 2018 |
Security modeling of grid systems using Petri nets PD Zegzhda, DP Zegzhda, MO Kalinin, AS Konoplev Computer Network Security: 6th International Conference on Mathematical …, 2012 | 14 | 2012 |
Supporting connectivity of VANET/MANET network nodes and elastic software-configurable security services using blockchain with floating genesis block A Busygin, M Kalinin, A Konoplev SHS Web of Conferences 44, 00020, 2018 | 12 | 2018 |
Applying the group signature for entity authentication in distributed grid computing networks EB Aleksandrova, DP Zegzhda, AS Konoplev Automatic Control and Computer Sciences 50, 739-742, 2016 | 10 | 2016 |
Formalization of objectives of grid systems resources protection against unauthorized access MO Kalinin, AS Konoplevy Minsk: Education and Upbringing, 2014 | 10 | 2014 |
Tasks of providing information security in distributed computing networks AS Konoplev, MO Kalinin Automatic Control and Computer Sciences 50, 669-672, 2016 | 8 | 2016 |
Access control method in distributed grid computing networks AS Konoplev, MO Kalinin Automatic Control and Computer Sciences 49, 679-683, 2015 | 7 | 2015 |
Analysis of the security of uefi bios embedded software in modern intel-based computers ID Pankov, AS Konoplev, AY Chernov Automatic Control and Computer Sciences 53 (8), 865-869, 2019 | 6 | 2019 |
Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates AG Busygin, AS Konoplev, MO Kalinin Automatic Control and Computer Sciences 50, 743-748, 2016 | 6 | 2016 |
Graphanalytical model of key distribution in networks with dynamic architecture AS Konoplev, MO Kalinin Nonlinear phenomena in complex systems 22 (3), 277-284, 2019 | 5 | 2019 |
Steganographic methods of communications in distributed computing networks AS Konoplev, AG Busygin Proceedings of the 8th International Conference on Security of Information …, 2015 | 5 | 2015 |
Access control system for distributed computing networks AS Konoplev, MO Kalinin Automatic Control and Computer Sciences 50, 664-668, 2016 | 4 | 2016 |
The use of virtualization technology in the dynamic analysis of software code AY Chernov, AS Konoplev Automatic Control and Computer Sciences 49, 834-837, 2015 | 3 | 2015 |
Universal national security platform for distributed information and telecommunication systems AS Konoplev Automatic Control and Computer Sciences 49, 721-726, 2015 | 3 | 2015 |
Constructing the model of an information system for the automatization of penetration testing AV Myasnikov, AS Konoplev, AF Suprun, VG Anisimov, VV Kasatkin, ... Automatic Control and Computer Sciences 55 (8), 949-955, 2021 | 2 | 2021 |
Blockchain based system model for assessment of security against threats caused by uneven distribution of computational power AG Busygin, AS Konoplev Automatic Control and Computer Sciences 54, 850-853, 2020 | 2 | 2020 |
The task of building a trusted computing environment on the Intel hardware platform AY Chernov, AS Konoplev, DV Reshetov Automatic Control and Computer Sciences 51, 844-847, 2017 | 2 | 2017 |
Applying virtualization technology for the construction of trusted executable environment AY Chernov, AS Konoplev, DP Zegzhda Proceedings of the 9th International Conference on Security of Information …, 2016 | 2 | 2016 |