39 results on '"Anton Konev"'
Search Results
2. Representation Learning for EEG-Based Biometrics Using Hilbert–Huang Transform
- Author
-
Mikhail Svetlakov, Ilya Kovalev, Anton Konev, Evgeny Kostyuchenko, and Artur Mitsel
- Subjects
EEG ,biometrics ,multi-similarity loss ,subject-independent ,representation learning ,Hilbert–Huang transform ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
A promising approach to overcome the various shortcomings of password systems is the use of biometric authentication, in particular the use of electroencephalogram (EEG) data. In this paper, we propose a subject-independent learning method for EEG-based biometrics using Hilbert spectrograms of the data. The proposed neural network architecture treats the spectrogram as a collection of one-dimensional series and applies one-dimensional dilated convolutions over them, and a multi-similarity loss was used as the loss function for subject-independent learning. The architecture was tested on the publicly available PhysioNet EEG Motor Movement/Imagery Dataset (PEEGMIMDB) with a 14.63% Equal Error Rate (EER) achieved. The proposed approach’s main advantages are subject independence and suitability for interpretation via created spectrograms and the integrated gradients method.
- Published
- 2022
- Full Text
- View/download PDF
3. Neural Network-Based Price Tag Data Analysis
- Author
-
Pavel Laptev, Sergey Litovkin, Sergey Davydenko, Anton Konev, Evgeny Kostyuchenko, and Alexander Shelupanov
- Subjects
image segmentation ,OCR ,YOLOv4-tiny ,neural networks ,UNet ,MobileNetV2 ,Information technology ,T58.5-58.64 - Abstract
This paper compares neural networks, specifically Unet, MobileNetV2, VGG16 and YOLOv4-tiny, for image segmentation as part of a study aimed at finding an optimal solution for price tag data analysis. The neural networks considered were trained on an individual dataset collected by the authors. Additionally, this paper covers the automatic image text recognition approach using EasyOCR API. Research revealed that the optimal network for segmentation is YOLOv4-tiny, featuring a cross validation accuracy of 96.92%. EasyOCR accuracy was also calculated and is 95.22%.
- Published
- 2022
- Full Text
- View/download PDF
4. A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats
- Author
-
Anton Konev, Alexander Shelupanov, Mikhail Kataev, Valeriya Ageeva, and Alina Nabieva
- Subjects
information security ,threat ,unauthorized ,object ,model ,system ,Mathematics ,QA1-939 - Abstract
Information security is one of the most important attributes of distributed systems that often operate on unreliable networks. Enabling security features during the development of a distributed system requires the careful analysis of potential attacks or threats in different contexts, a process often referred to as «threat modeling». Information protection should be comprehensive, but it is also necessary to take into account the possibility of the emergence of threats specific to a certain information system. Many public and private organizations are still trying to implement system models and the threats directed at them on their own. The main reason for this is the lack of useful and high-quality methodologies that can help developers design system models. This review explores a variety of the literature on confidentiality- and integrity-aware system design methodologies, as well as threat classification methods, and identifies key issues that may be referenced by organizations to make design system processes easier. In particular, this article takes a look at the extent to which existing methodologies cover objects of protection and methods of classifying threats, as well as whether there are such models of systems in which the object itself and the threats directed at it are described. This includes whether the compiled models exhibit symmetry or asymmetry. This literature research shows that methodologies appear to be heterogeneous and versatile, since existing methodologies often only focus on one object of protection (a system). Based on the given analysis, it can be concluded that the existing methodologies only relate superficially to the description of system models and threats, and it is necessary to develop a more complete abstract model of the protected object and threats aimed at it in order to make this model suitable for any organization and protect it against most threats.
- Published
- 2022
- Full Text
- View/download PDF
5. Adversarial Attacks Impact on the Neural Network Performance and Visual Perception of Data under Attack
- Author
-
Yakov Usoltsev, Balzhit Lodonova, Alexander Shelupanov, Anton Konev, and Evgeny Kostyuchenko
- Subjects
digital signature ,python ,neural networks ,biometric authentication ,adversarial attack ,fast gradient method ,Information technology ,T58.5-58.64 - Abstract
Machine learning algorithms based on neural networks are vulnerable to adversarial attacks. The use of attacks against authentication systems greatly reduces the accuracy of such a system, despite the complexity of generating a competitive example. As part of this study, a white-box adversarial attack on an authentication system was carried out. The basis of the authentication system is a neural network perceptron, trained on a dataset of frequency signatures of sign. For an attack on an atypical dataset, the following results were obtained: with an attack intensity of 25%, the authentication system availability decreases to 50% for a particular user, and with a further increase in the attack intensity, the accuracy decreases to 5%.
- Published
- 2022
- Full Text
- View/download PDF
6. The Comparison of Cybersecurity Datasets
- Author
-
Ahmed Alshaibi, Mustafa Al-Ani, Abeer Al-Azzawi, Anton Konev, and Alexander Shelupanov
- Subjects
cybersecurity ,network security ,datasets ,machine learning ,cyberattacks ,IoT ,Bibliography. Library science. Information resources - Abstract
Almost all industrial internet of things (IIoT) attacks happen at the data transmission layer according to a majority of the sources. In IIoT, different machine learning (ML) and deep learning (DL) techniques are used for building the intrusion detection system (IDS) and models to detect the attacks in any layer of its architecture. In this regard, minimizing the attacks could be the major objective of cybersecurity, while knowing that they cannot be fully avoided. The number of people resisting the attacks and protection system is less than those who prepare the attacks. Well-reasoned and learning-backed problems must be addressed by the cyber machine, using appropriate methods alongside quality datasets. The purpose of this paper is to describe the development of the cybersecurity datasets used to train the algorithms which are used for building IDS detection models, as well as analyzing and summarizing the different and famous internet of things (IoT) attacks. This is carried out by assessing the outlines of various studies presented in the literature and the many problems with IoT threat detection. Hybrid frameworks have shown good performance and high detection rates compared to standalone machine learning methods in a few experiments. It is the researchers’ recommendation to employ hybrid frameworks to identify IoT attacks for the foreseeable future.
- Published
- 2022
- Full Text
- View/download PDF
7. Implementation and Evaluation of Nodal Distribution and Movement in a 5G Mobile Network
- Author
-
Dmitry Baranov, Alexandr Terekhin, Dmitry Bragin, and Anton Konev
- Subjects
5G ,networks ,security ,reliability ,NS3 ,Okumura–Hata ,Information technology ,T58.5-58.64 - Abstract
The determining factor in the accelerated pace of informatization is the increase in the speed and reliability of data transmission networks. In this regard, new and existing standards are developed and modernized. A lot of organizations are constantly working on the development and implementation of new generation communication networks. This article provides an overview of available software solutions that allow us to investigate and evaluate the behavior of data networks. In particular, tools suitable for mobile communication systems were determined, having sufficient built-in functionality and allowing us to add our own implementations. NS3 has been chosen as a suitable network simulator. Apart from the review, a solution for this tool was developed. It allows estimating the reliability of data transmission from the start movement of a network node at all times during its removal from a base station.
- Published
- 2021
- Full Text
- View/download PDF
8. IoT Security Mechanisms in the Example of BLE
- Author
-
Evgeny Kalinin, Danila Belyakov, Dmitry Bragin, and Anton Konev
- Subjects
Bluetooth mesh ,BLE ,security ,IoT ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In recent years, a lot of IoT devices, wireless sensors, and smart things contain information that must be transmitted to the server for further processing. Due to the distance between devices, battery power, and the possibility of sudden device failure, the network that connects the devices must be scalable, energy efficient, and flexible. Particular attention must be paid to the protection of the transmitted data. The Bluetooth mesh was chosen as such a network. This network is built on top of Bluetooth Low-Energy devices, which are widespread in the market and whose radio modules are available from several manufacturers. This paper presents an overview of security mechanisms for the Bluetooth mesh network. This network provides encryption at two layers: network and upper transport layers, which increases the level of data security. The network uses sequence numbers for each message to protect against replay attacks. The introduction of devices into the network is provided with an encryption key, and the out-of-band (OOB) mechanism is also supported. At the moment, a comparison has been made between attacks and defense mechanisms that overlap these attacks. The article also suggested ways to improve network resiliency.
- Published
- 2021
- Full Text
- View/download PDF
9. Mathematical Model for Choosing Counterparty When Assessing Information Security Risks
- Author
-
Andrey Koltays, Anton Konev, and Alexander Shelupanov
- Subjects
model ,trustworthiness ,risks ,information and analytical systems ,machine learning ,Insurance ,HG8011-9999 - Abstract
The need to assess the risks of the trustworthiness of counterparties is increasing every year. The identification of increasing cases of unfair behavior among counterparties only confirms the relevance of this topic. The existing work in the field of information and economic security does not create a reasonable methodology that allows for a comprehensive study and an adequate assessment of a counterparty (for example, a developer company) in the field of software design and development. The purpose of this work is to assess the risks of a counterparty’s trustworthiness in the context of the digital transformation of the economy, which in turn will reduce the risk of offenses and crimes that constitute threats to the security of organizations. This article discusses the main methods used in the construction of a mathematical model for assessing the trustworthiness of a counterparty. The main difficulties in assessing the accuracy and completeness of the model are identified. The use of cross-validation to eliminate difficulties in building a model is described. The developed model, using machine learning methods, gives an accurate result with a small number of compared counterparties, which corresponds to the order of checking a counterparty in a real system. The results of calculations in this model show the possibility of using machine learning methods in assessing the risks of counterparty trustworthiness.
- Published
- 2021
- Full Text
- View/download PDF
10. Generation of an EDS Key Based on a Graphic Image of a Subject’s Face Using the RC4 Algorithm
- Author
-
Alexey Semenkov, Dmitry Bragin, Yakov Usoltsev, Anton Konev, and Evgeny Kostuchenko
- Subjects
digital signature ,computer vision ,cryptography ,security ,authenticity ,algorithms ,Information technology ,T58.5-58.64 - Abstract
Modern facial recognition algorithms make it possible to identify system users by their appearance with a high level of accuracy. In such cases, an image of the user’s face is converted to parameters that later are used in a recognition process. On the other hand, the obtained parameters can be used as data for pseudo-random number generators. However, the closeness of the sequence generated by such a generator to a truly random one is questionable. This paper proposes a system which is able to authenticate users by their face, and generate pseudo-random values based on the facial image that will later serve to generate an encryption key. The generator of a random value was tested with the NIST Statistical Test Suite. The subsystem of image recognition was also tested under various conditions of taking the image. The test results of the random value generator show a satisfactory level of randomness, i.e., an average of 0.47 random generation (NIST test), with 95% accuracy of the system as a whole.
- Published
- 2021
- Full Text
- View/download PDF
11. Metric of Highlighting the Synchronicity of Time Series and Its Application in Analyzing the Fundamental Frequencies of the Speaker’s Speech Signal
- Author
-
Elena Kataeva, Alexey Yakimuk, Anton Konev, and Alexander Shelupanov
- Subjects
synchronicity ,time series ,vocal performance ,note recognition ,speech technologies ,fundamental frequency ,Mathematics ,QA1-939 - Abstract
As part of the study, the problem of developing and applying a metric for assessing the degree of similarity of time series is considered, which makes it possible to consider the assumptions about the model of a series when comparing, as well as to compare the values of the corresponding characteristics of the series. Characteristics can be values that describe the structure of a series, or directly the values of the approximating function, which can be obtained using nonparametric statistics methods. One of the directions in which this approach can be applied to assessing the similarity of time series is the study of vocal performances. In practice, the degree of similarity in the performance of melodies by several speakers was analyzed. It was determined that, using the synchronicity metric, it is possible to implement an exercise in which students need to repeat the melody after the teacher. In addition, this approach was applied in the segment identification module with an abrupt change in the sounding of the fundamental frequency. This work is devoted to the modification of the program complex for vocal recognition in order to identify notes with a sharp change in the fundamental frequency. The complex is aimed at carrying out additional independent training in teaching vocals. The use of the software package will allow, in real time, providing feedback to the user with an assessment of the quality of their singing. This should allow students to study not only under the supervision of a teacher, but also independently in the early stages of learning. The basic algorithm of the program recognizes notes without sharp changes in frequencies with high accuracy, which is confirmed by experiments. In order to recognize by the algorithms of the program notes sung vibrato and glissando in singing, a new analysis method based on the metric of time series synchronicity is proposed.
- Published
- 2020
- Full Text
- View/download PDF
12. Information Security Methods—Modern Research Directions
- Author
-
Alexander Shelupanov, Oleg Evsyutin, Anton Konev, Evgeniy Kostyuchenko, Dmitry Kruchinin, and Dmitry Nikiforov
- Subjects
symmetry ,model of information security system ,threat model ,biometric authentication ,neural networks ,encryption ,primes ,digital object authenticity ,steganography ,automated control systems ,secure communication channels ,Mathematics ,QA1-939 - Abstract
In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing the security of the information systems. This direction includes the construction of an information security threats model and a protection system model, which allow to compile a complete list of threats and methods of protection against them. The main directions of information security tools development are dynamic methods of biometrics, methods for generating prime numbers for data encryption, steganography, methods and means of data protection in Internet of Things (IoT) systems. The article presents the main results of research in the listed areas of information security. The resultant properties in symmetric cryptography are based on the properties of the power of the generating functions. The authors have obtained symmetric principles for the development of primality testing algorithms, as discussed in the Appendix.
- Published
- 2019
- Full Text
- View/download PDF
13. A Fuzzy Classifier with Feature Selection Based on the Gravitational Search Algorithm
- Author
-
Marina Bardamova, Anton Konev, Ilya Hodashinsky, and Alexander Shelupanov
- Subjects
feature selection ,fuzzy-rule-based classifier ,metaheuristics ,gravitational search algorithm ,Mathematics ,QA1-939 - Abstract
This paper concerns several important topics of the Symmetry journal, namely, pattern recognition, computer-aided design, diversity and similarity. We also take advantage of the symmetric and asymmetric structure of a transfer function, which is responsible to map a continuous search space to a binary search space. A new method for design of a fuzzy-rule-based classifier using metaheuristics called Gravitational Search Algorithm (GSA) is discussed. The paper identifies three basic stages of the classifier construction: feature selection, creating of a fuzzy rule base and optimization of the antecedent parameters of rules. At the first stage, several feature subsets are obtained by using the wrapper scheme on the basis of the binary GSA. Creating fuzzy rules is a serious challenge in designing the fuzzy-rule-based classifier in the presence of high-dimensional data. The classifier structure is formed by the rule base generation algorithm by using minimum and maximum feature values. The optimal fuzzy-rule-based parameters are extracted from the training data using the continuous GSA. The classifier performance is tested on real-world KEEL (Knowledge Extraction based on Evolutionary Learning) datasets. The results demonstrate that highly accurate classifiers could be constructed with relatively few fuzzy rules and features.
- Published
- 2018
- Full Text
- View/download PDF
14. Model of Threats to the Integrity and Availability of Information Processed in Cyberspace.
- Author
-
Nikolay Sergeevich Egoshin, Anton Konev, and Aleksandr Aleksandrovich Shelupanov
- Published
- 2023
- Full Text
- View/download PDF
15. Speech frame implementation for speech analysis and recognition.
- Author
-
Anton Konev, V. S. Khlebnikov, and A. Yu. Yakimuk
- Published
- 2021
16. A review on security analysis of cyber physical systems using Machine learning
- Author
-
Alshaibi Ahmed Jamal, Al-Ani Mustafa Majid, Alexander Alexandrovich Shelupanov, Anton Konev, and Tatiana Kosachenko
- Subjects
Adaptive strategies ,Security analysis ,Security framework ,Computer science ,business.industry ,Deep learning ,Perspective (graphical) ,Cyber-physical system ,Globe ,General Medicine ,Machine learning ,computer.software_genre ,Cyber Space ,medicine.anatomical_structure ,medicine ,Artificial intelligence ,business ,computer - Abstract
The concept of Cyber Physical System (CPS) is widely used in different industries across the globe. In fact, it is the holistic approach towards dealing with cyber space and physical environments that do have inter-dependencies. In the existing systems, there was a separate approach for security of the two worlds (cyber and physical). However, it does not provide necessary security when security is employed independently. The research in this paper identifies the need for integrated security for CPS. Besides it throws light into different security challenges associated with CPS and the countermeasures that existed based on machine learning and deep learning techniques that come under Artificial Intelligence (AI) and data science. From the review of literature, it is understood that data science perspective is suitable for protecting CPS with required adaptive strategy. This paper provides several useful insights related to security analysis of CPS using machine learning. It paves way for further investigation and realize a comprehensive security framework to protect CPS from internal and external cyber-attacks.
- Published
- 2023
- Full Text
- View/download PDF
17. Functional Modeling as a Basis for Classifying Security Threats
- Author
-
Anton Konev
- Published
- 2022
- Full Text
- View/download PDF
18. A Model of Threats to the Confidentiality of Information Processed in Cyberspace Based on the Information Flows Model.
- Author
-
Nikolay Sergeevich Egoshin, Anton Konev, and Alexander Alexandrovich Shelupanov
- Published
- 2020
- Full Text
- View/download PDF
19. Application of the Gravitational Search Algorithm for Constructing Fuzzy Classifiers of Imbalanced Data.
- Author
-
Marina Bardamova, Ilya A. Hodashinsky, Anton Konev, and Alexander Alexandrovich Shelupanov
- Published
- 2019
- Full Text
- View/download PDF
20. Model of Threats to Computer Network Software.
- Author
-
Aleksey Novokhrestov, Anton Konev, and Alexander Alexandrovich Shelupanov
- Published
- 2019
- Full Text
- View/download PDF
21. Threat Model for Trusted Sensory Information Collection and Processing Platform
- Author
-
Alexander Sharamok, Tatiana Kosachenko, Anton Konev, and Danil Dudkin
- Subjects
business.industry ,Computer science ,Economic sector ,Cloud computing ,Sensory system ,Information security ,Computer security ,computer.software_genre ,Transmission (telecommunications) ,Threat model ,Scalability ,Trusted Platform Module ,business ,computer - Abstract
The number of systems responsible for the processing and transmission of sensory information is steadily growing, which naturally gives rise to the need for a scalable trusted Platform that provides the formation of end-to-end processes in various priority sectors of the economy and social sphere and is an automated information control system for collecting and processing sensory information.
- Published
- 2021
- Full Text
- View/download PDF
22. Information Security Subsystem Model for a Trusted Platform for Collecting and Processing Sensory Information
- Author
-
Anton Konev, Aleksandr Sharamok, Dmitry Bragin, Alexander Bakhtin, and Evgeniy Bulatov
- Subjects
Set (abstract data type) ,Matching (statistics) ,Computer science ,business.industry ,Cloud computing ,Trusted Platform Module ,Information security ,Computer security model ,business ,Software engineering ,Structuring ,Information protection policy - Abstract
When designing the Platform, which is an automated multilevel system for collecting, processing and presenting sensory information to the user, which ensures the formation of end-to-end processes in various priority sectors of the economy and social sphere, the question of ensuring the information security of the Platform arises. The first stage of solving this issue is not only the implementation of a set of methods, approaches and tools to provide information security, but also their structuring within the framework of the designed Platform. This article discusses the definition of implementation requirements based on an integrated approach that takes into account the requirements of standards and based on an original approach to the classification of information protection mechanisms. The classification approach is based on matching the types of protection mechanisms with the types of security risks relevant to the considered Platform. #CSOC1120.
- Published
- 2021
- Full Text
- View/download PDF
23. ALGORITHMIC SUPPORT OF SYSTEM FOR WHISPERING SPEECH ANALYSIS
- Author
-
Anton Konev, Aleksey Yakimuk, and Yuriy Tereschenko
- Subjects
03 medical and health sciences ,0302 clinical medicine ,Computer science ,030220 oncology & carcinogenesis ,Acoustics ,General Materials Science ,030204 cardiovascular system & hematology ,Whispering - Published
- 2018
- Full Text
- View/download PDF
24. Model of the life cycle of the information security system
- Author
-
Tatiana E. Mineeva, Aleksander A. Shelupanov, Mikhail L. Soloviev, Anton Konev, and Mariya P. Silich
- Subjects
Authentication ,lcsh:T58.5-58.64 ,Relation (database) ,lcsh:Information technology ,Computer science ,business.industry ,General Medicine ,Information security ,lcsh:Q350-390 ,Documentation ,Software ,Information security management ,Risk analysis (engineering) ,Human resource management ,lcsh:Information theory ,Key (cryptography) ,business ,information protection system, life cycle, management processes, classification - Abstract
When building an information security system, one of the key problems is the creation of regulatory documents. Regulators in the field of information security determine the list of necessary documentation mainly in relation to protection mechanisms (authentication, anti-virus protection, etc.) and practically do not take into account the stages of the life cycle of information security tools and personnel of the organization. The article proposes an approach to formalization of the list of information security management processes that need regulation. This approach allows the formation of information security policy to take into account the processes of personnel management and the complex of software and hardware information security, which is necessary to ensure a high level of security of critical information infrastructure.
- Published
- 2018
- Full Text
- View/download PDF
25. Speech Signal Segmentation into Vocalized and Unvocalized Segments on the Basis of Simultaneous Masking
- Author
-
Anton Konev, E. Yu. Kostyuchenko, and Roman Meshcheryakov
- Subjects
Masking (art) ,Basis (linear algebra) ,010308 nuclear & particles physics ,Computer science ,Speech recognition ,media_common.quotation_subject ,Binary number ,02 engineering and technology ,Condensed Matter Physics ,01 natural sciences ,Signal ,medicine.anatomical_structure ,Perception ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,Auditory system ,020201 artificial intelligence & image processing ,Segmentation ,Electrical and Electronic Engineering ,Joint (audio engineering) ,Instrumentation ,media_common - Abstract
This paper touches upon a model of simultaneous acoustic masking, which detects speech signal components perceived by a human’s auditory system. A simultaneous masking algorithm on the basis of this model is proposed. It is shown that, after simultaneous masking, a signal becomes a binary structure that reflects the harmonic structure of a vocalized sequence. It is experimentally proven that this structure can be used to detect key speech segments (from the standpoint of perception by an auditory system). This structure serves as a basis for an algorithm of high-quality segmentation of a speech signal into vocalized and unvocalized segments, which does not require learning before use. The joint use of the algorithms for simultaneous masking and speech signal segmentation is tested, and their performance is evaluated.
- Published
- 2018
- Full Text
- View/download PDF
26. ALGORITHM OF SEGMENTATION OF A SPEECH SIGNAL BASED ON THE VALUE OF THE MINIMUM MEASURE OF DISTINCTION
- Author
-
Radioelectronics (Tusur), Anton Konev, and A.Yu. Yakimuk
- Subjects
Computer science ,Measure (physics) ,Segmentation ,Value (mathematics) ,Algorithm ,Signal - Published
- 2018
- Full Text
- View/download PDF
27. Building a model of infringer
- Author
-
Nikolay S. Egoshin, Anton Konev, and Aleksander A. Shelupanov
- Subjects
lcsh:T58.5-58.64 ,Process (engineering) ,Computer science ,information security ,lcsh:Information technology ,confidential information ,General Medicine ,Plan (drawing) ,Information security ,lcsh:Q350-390 ,threat model ,Work (electrical) ,Risk analysis (engineering) ,Threat model ,model of infringer ,lcsh:Information theory ,Normative ,Confidentiality ,Set (psychology) - Abstract
By a model of infringer one means a set of assumptions about the specific (restricted) tools of the infringer, which the latter can use to conduct attacks. The infringer model is an important part of the organization's information security. One should realize that ignoring the model, or building it without due care, can seriously affect the security of confidential information and lead to its loss. The infringer model is informal, which implies the absence of strict and unambiguous methodology for developing such a model. There exist many academic and technical publications proposing various methods of classifying violators. Meanwhile, many information security practitioners are forced to create their own normative and methodological documents, because existing models do not necessarily capture all the aspects of the organization's work. Despite the fact that many models have a high level of correlation between classification characteristics, it has not been possible to work out a unified model so far. We attempt to develop our own methodology for building the infringer model. We have started this project by outlining the roadmap: (1) study the existing methods of constructing the infringer model; (2) identify shortcomings of existing methods; (3) develop a model of the infringer and a methodology for listing the most likely violators, with taking into account the identified shortcomings. In the process of implementation of the plan, we have analyzed several existing models of infringer and revealed their shortcomings and inherent difficulties. In the developed model, causal relationships between the elements of the model and the chains of the alleged consequences have been constructed, and possible types of alleged violators have been described and ranked. As a result, our model allows one to create a more deep description of the infringer.
- Published
- 2017
28. PROGRAM COMPLEX FOR SPEECH SIGNAL AND VOCAL PERFORMANCE SEGMENTATION MODELING AUTOMATION
- Author
-
Aleksei Yakimuk, Andrei Osipov, and Anton Konev
- Subjects
business.industry ,Computer science ,Speech recognition ,Segmentation ,business ,Automation ,Signal - Published
- 2017
- Full Text
- View/download PDF
29. Gravitational Search For Designing A Fuzzy Rule-Based Classifiers For Handwritten Signature Verification
- Author
-
Alexander Alexandrovich Shelupanov, Anton Konev, Marina Bardamova, and Ilya Hodashinsky
- Subjects
lcsh:Computer software ,Authentication ,Verification ,Biometrics ,Fuzzy Classifier ,Gravitational Search Algorithm ,Fuzzy rule ,Computer science ,business.industry ,Gravitational search algorithm ,Pattern recognition ,Fuzzy classifier ,Gravitation ,Identifier ,lcsh:QA76.75-76.765 ,ComputingMethodologies_PATTERNRECOGNITION ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Classifier (UML) ,Metaheuristic ,Software ,Computer Science::Cryptography and Security - Abstract
Handwritten signatures are used in authentication systems as a universal biometric identifier. Signature authenticity verification requires building and training a classifier. This paper describes a new approach to the verification of handwritten signatures by dynamic characteristics with a fuzzy rule-based classifier. It is suggested to use the metaheuristic Gravitational Search Algorithm for the selection of the relevant features and tuning fuzzy rule parameters. The efficiency of the approach was tested with an original dataset; the type II errors in finding the signature authenticity did not exceed 0.5% for the worst model and 0.08% for the best model.
- Published
- 2019
30. Computer network threat modelling
- Author
-
Aleksey Novokhrestov, A Buymov, Alexander Alexandrovich Shelupanov, and Anton Konev
- Subjects
History ,business.industry ,Computer science ,Threat model ,Information system ,business ,Computer Science Applications ,Education ,Computer network - Abstract
The paper discusses methods for constructing threat models of information systems and computer networks. The disadvantages of existing approaches are highlighted. The authors propose an approach to building a computer network model, as well as describing threats to information and the system. The proposed approach takes into account the identified shortcomings of existing solutions and is aimed at reducing the impact of the subjective opinion of an expert when compiling lists of threats.
- Published
- 2020
- Full Text
- View/download PDF
31. Development of a protected network for an automated system of energy control and accounting
- Author
-
M. M. Antonov, S.A. Cherepanov, D. S. Nikiforov, and Anton Konev
- Subjects
Development (topology) ,Risk analysis (engineering) ,Energy control ,General Medicine ,Business ,Environmental planning - Published
- 2016
- Full Text
- View/download PDF
32. Applying the principle of distribution in the program complex for vocal recognition
- Author
-
M M Nemirovich-Danchenko, Anton Konev, Yu V. Andreeva, and A. Yu Yakimuk
- Subjects
Distribution (number theory) ,Computer science ,Statistical physics - Abstract
This article is devoted to studying the possibility of improving the quality of the identification of notes in vocal performance. In the present work, the authors described the transition of the program complex to a distributed functioning model. At this stage, this allowed organizing the storage of results for students and the introduction of an assessment mode for teachers. A study was conducted to improve the quality of note recognition through the use of other algorithms. During the tests, it was determined that the presence of vibrato in singing makes the greatest contribution to the number of unidentified notes. In view of the findings scheduled implementation in a program complex the paalgorithm which is responsible for determining the quality of vibrato in singing. The purpose of this modification is to get rid of novice singers from problems in singing, such as tremor.
- Published
- 2019
- Full Text
- View/download PDF
33. Modeling threats to information security using IDEF0 methodology
- Author
-
A. A. Khristolyubova, Alexander Alexandrovich Shelupanov, Anton Konev, and M. L. Solovev
- Subjects
Computer science ,Information security ,Computer security ,computer.software_genre ,computer ,IDEF0 - Abstract
The paper describes the implementation of a method for modeling threats to information security using the methodology of IDEF0 functional modeling to solve problems of formalization of specific threat models. The formulation of the method for modeling threats to information security accounts for various media of information transmission and its carriers. In addition, a process approach to information handling is used.
- Published
- 2019
- Full Text
- View/download PDF
34. Functional Scheme of the Process of Access Control
- Author
-
Anton, Konev, primary, Aleksandr, Shelupanov, additional, and Nikolay, Egoshin, additional
- Published
- 2018
- Full Text
- View/download PDF
35. Fuzzy classifier design for network intrusion detection using the gravitational search algorithm
- Author
-
Marina Bardamova, Alexander Alexandrovich Shelupanov, Anton Konev, and Ilya Hodashinsky
- Subjects
Fuzzy classifier ,History ,business.industry ,Computer science ,Gravitational search algorithm ,Pattern recognition ,Artificial intelligence ,Network intrusion detection ,business ,Computer Science Applications ,Education - Published
- 2019
- Full Text
- View/download PDF
36. Software for Speech Signal Research in Patients with Malignant Diseases of the Throat
- Author
-
Anton Konev, V. P. Bondarenko, A. N. Kvasov, S. Yu. Chizhevskaya, Roman Meshcheryakov, and E. L. Choinzonov
- Subjects
medicine.medical_specialty ,Rehabilitation ,business.industry ,Speech recognition ,medicine.medical_treatment ,SIGNAL (programming language) ,Biomedical Engineering ,Medicine (miscellaneous) ,Disease ,Speech Therapist ,Medical Laboratory Technology ,medicine.anatomical_structure ,Software ,Throat ,otorhinolaryngologic diseases ,medicine ,In patient ,Medical physics ,business ,Set (psychology) - Abstract
Software for speech signal research in patients with malignant diseases of the throat is considered in this work. Basic windows of this system are discussed. These windows represent voice parameters set by a speech therapist to diagnose the disease and to make a decision concerning therapy and rehabilitation.
- Published
- 2009
- Full Text
- View/download PDF
37. Mathematical model of threats to information systems
- Author
-
Aleksey Novokhrestov and Anton Konev
- Subjects
business.industry ,Network security ,Computer science ,media_common.quotation_subject ,Computer security model ,Computer security ,computer.software_genre ,Asset (computer security) ,Software ,Evaluation methods ,Threat model ,Information system ,Quality (business) ,business ,computer ,media_common - Abstract
Existence of the need to assess the quality of computer networks security requires the development of a formalized evaluation method. One of the elements of such method is the model of threats to information system. In the article it is described a model of threats to integrity of information system exposed as a 3-level attributed metagraph. Threat model includes the threats on software, operating system and network layers. The model is used as part of the methodology for assessing the quality of computer network security.
- Published
- 2016
- Full Text
- View/download PDF
38. The program complex for vocal recognition
- Author
-
Evgeny Kostyuchenko, Anton Konev, and Alexey Yakimuk
- Subjects
History ,Computer science ,Computer Science Applications ,Education - Published
- 2017
- Full Text
- View/download PDF
39. A medical hardware complex for speech signal research in patients with phonation disorders
- Author
-
Anton Konev, S. Yu. Chizhevskaya, Roman Meshcheryakov, L. N. Balatskaya, V. P. Bondarenko, and E. Ts. Choinzonov
- Subjects
Speech production ,medicine.medical_specialty ,Computer science ,business.industry ,Speech recognition ,Biomedical Engineering ,Medicine (miscellaneous) ,Phonation Disorders ,Audiology ,Signal ,Human auditory system ,Medical Laboratory Technology ,otorhinolaryngologic diseases ,medicine ,In patient ,State (computer science) ,business ,Computer hardware - Abstract
The main elements of a medical hardware complex for speech signal research in patients with phonation disorders are considered. The complex is based on a model of human auditory system. It is shown that the complex can be used for speech recovery and diagnosis of the state of speech production apparatus.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.