SCIENTIFICALLY BASED METHODOLOGICAL APPARATUS FOR JUSTIFYING RATIONAL METHODS OF MONITORING AND RESPONDING TO POSSIBLE INFORMATION SECURITY INCIDENTS IN THE DIGITAL INFORMATION INFRASTRUCTURE OF THE EMERCOM OF RUSSIA AND THE RESULTS OF ITS APPROVAL
Rubrics: ANALYTICS
Abstract and keywords
Abstract (English):
The paper presents scientifically substantiated methods of monitoring and responding to possible information security incidents in the departmental digital information infrastructure and the results of their testing at the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia on typical fragments. The materials are intended for managers and specialists of the information security units of departmental information infrastructures in order to possible updating and improvement of object procedures for monitoring and responding to information security incidents. The materials were developed with the aim of implementing the results of scientific research conducted by the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia in 2025 on the topic of "Cyber Monitoring".

Keywords:
information infrastructure, information security, incident, monitoring, response, methods, testing
Text
Text (PDF): Read Download
References

1. Otchet o NIR shifr «Model'» [Razrabotka metodologii i special'noy tehnologii postroeniya uchebnyh disciplin dlya osvoeniya programm perepodgotovki i povysheniya kvalifikacii dolzhnostnyh lic MChS Rossii, osuschestvlyayuschih professional'nuyu deyatel'nost' v oblasti obespecheniya informacionnoy bezopasnosti i zaschity informacii : otchet o NIR / rukovoditel' A. V. Shestakov ; ispolniteli : A. N. Metel'kov, M. V. Buynevich [i dr.]; Ministerstvo Rossiyskoy Federacii po delam grazhdanskoy oborony, chrezvychaynym situaciyam i likvidacii posledstviy stihiynyh bedstviy, Sankt-Peterburgskiy universitet GPS MChS Rossii. – Sankt-Peterburg, 2023 – 409 s. – Reg. № NIOKTR 123030100009-7.]

2. Otchet o NIR shifr «Garmoniya» [Razrabotka principov, metodologii i elementov tehnologii resheniya prikladnyh zadach garmonizacii normativnoy pravovoy bazy v chasti trebovaniy informacionnoy i kiberbezopasnosti v interesah MChS Rossii : otchet o NIR / rukovoditel' A. V. Shestakov ; ispolniteli : M. V. Buynevich, A. V. Matveev, A. V. Maksimov [i dr.]; Ministerstvo Rossiyskoy Federacii po delam grazhdanskoy oborony, chrezvychaynym situaciyam i likvidacii posledstviy stihiynyh bedstviy, Sankt-Peterburgskiy universitet GPS MChS Rossii. – Sankt-Peterburg, 2024 – 402 s. – Reg. № NIOKTR 124120300001-6.]

3. Metodika ocenki ugroz bezopasnosti informacii: metodicheskiy dokument / Utverzhden FSTEK Rossii 05.02.2021 g. – URL: https://fstec.ru/dokumenty/vse-dokumenty/spetsialnye-normativnye-dokumenty/metodicheskij-dokument-ot-5-fevralya-2021-g (data obrascheniya 15.03.2025)

4. GOST R 22.0.05-2020 Bezopasnost' v chrezvychaynyh situaciyah. Tehnogennye chrezvychaynye situacii. Terminy i opredeleniya – M., 2020. – 12 s.

5. GOST R 51901.1-2002 Menedzhment riska. Analiz riska tehnologicheskih sistem (s Popravkoy) – M., 2002. – 27 s.

6. Buynevich M.V., Izrailov K.E. Avtorskaya metrika ocenki blizosti programm: prilozhenie dlya poiska uyazvimostey s pomosch'yu geneticheskoy deevolyucii // Programmnye produkty i sistemy. 2025. № 1. S. 89-99.

7. Buynevich M.V., Izrailov K.E. Signaturnyy poisk uyazvimostey v mashinnom kode na baze geneticheskoy dekompilyacii // Zaschita informacii. Insayd. 2025. № 2 (122). S. 8-17.

8. Leonov N.V., Buynevich M.V. Problemnye voprosy poiska uyazvimostey v programmnom obespechenii promyshlennyh IT-ustroystv // Avtomatizaciya v promyshlennosti. 2023. № 12. S. 59-63.

9. Leonov N.V., Buynevich M.V. Mashinnoe obuchenie vs poisk uyazvimostey v programmnom obespechenii: analiz primenimosti i sintez konceptual'noy sistemy // Trudy uchebnyh zavedeniy svyazi. 2023. T. 9. № 6. S. 83-94.

10. Buinevich M., Izrailov K., Vladyko A. The life cycle of vulnerabilities in the representations of software for telecommunication devices // 18th International Conference On Advanced Communications Technology (ICACT-2016). 2016. PP. 430-435.

11. Izrailov K.E. Sistema kriteriev ocenki sposobov poiska uyazvimostey i metrika ponyatnosti predstavleniya programmnogo koda // Informatizaciya i svyaz'. 2017. № 3. S. 111-118.

12. Patel J., Lee R., Kim H. Architectural View in Software Development Life-Cycle Practices // 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). 2007. PP. 194 - 199

13. Skramstad T., Khan M. A redefined software life cycle model for improved maintenance // Proceedings Conference on Software Maintenance. 1992. PP. 193 - 197.

14. Havlice Z., Kunstar J., Adamuscinova I., Plocica O. Knowledge in software life cycle // 7th International Symposium on Applied Machine Intelligence and Informatics. 2009. PP. 153-157.

15. Buinevich M., Izrailov K. Method and utility for recovering code algorithms of telecommunication devices for vulnerability search // 16th International Conference on Advanced Communication Technology (ICACT-2014). 2014. PP. 172-176.

16. Buinevich M., Izrailov K., Vladyko A. Method for partial recovering source code of telecommunication devices for vulnerability search // 17th International Conference On Advanced Communications Technology (ICACT-2015). 2015. PP. 76-80.

17. Buinevich M., Izrailov K., Vladyko A. Method and prototype of utility for partial recovering source code for low-level and medium-level vulnerability search // 18th International Conference on Advanced Communication Technology (ICACT-2016). 2016. PP. 700-707.

18. Buinevich M., Izrailov K., Vladyko A. Testing of Utilities for Finding Vulnerabilities in the Machine Code of Telecommunication Devices // 19th International Conference on Advanced Communication Technology (ICACT-2017). 2017. PP. 408-414.

19. Mobley K. Reverse Engineering for Software Performance Engineering // 14th Working Conference on Reverse Engineering (WCRE 2007). 2007. PP. 302-304

20. Agarwal S., Aggarwal A. Model driven reverse engineering of user interface — A comparative study of static and dynamic model generation tools // 2014 International Conference on Parallel, Distributed and Grid Computing. 2014. PP. 268-273.

21. Buynevich M.V., Izrailov K.E. Metod algoritmizacii mashinnogo koda telekommunikacionnyh ustroystv // Telekommunikacii. 2012. № 12. C. 2-6.

22. Buynevich M.V., Izrailov K.E. Avtomatizirovannoe sredstvo algoritmizacii mashinnogo koda telekommunikacionnyh ustroystv // Telekommunikacii. 2013. № 6. S. 2-9.

23. Buynevich M.V., Izrailov K.E., Scherbakov O.V. Strukturnaya model' mashinnogo koda, specializirovannaya dlya poiska uyazvimostey v programmnom obespechenii avtomatizirovannyh sistem upravleniya // Problemy upravleniya riskami v tehnosfere. 2014. № 3(31). S. 68-74.

24. Buynevich M.V., Izrailov K.E., Scherbakov O.V. Model' mashinnogo koda, specializirovannaya dlya poiska uyazvimostey // Vestnik Voronezhskogo instituta GPS MChS Rossii. 2014. № 2(11). S. 46-51.

25. Izrailov K.E. Rasshirenie yazyka «C» dlya opisaniya algoritmov koda telekommunikacionnyh ustroystv [Elektronnyy resurs] // Informacionnye tehnologii i telekommunikacii. 2013. № 2(2). S. 21-31.

26. Pokusov V.V. Sinergeticheskie effekty vzaimodeystviya moduley sistemy obespecheniya informacionnoy bezopasnosti // Informatizaciya i svyaz'. 2018. № 3. S 61-67.

27. Buynevich M.V., Pokusov V.V., Izrailov K.E. Effekty vzaimodeystviya obespechivayuschih sluzhb predpriyatiya informacionnogo servisa (na primere sluzhby pozharnoy bezopasnosti) // Vestnik Sankt-Peterburgskogo universiteta Gosudarstvennoy protivopozharnoy sluzhby MChS Rossii. 2018. № 4. S. 48-54.

28. Pokusov V.V. Osobennosti vzaimodeystviya sluzhb obespecheniya funkcionirovaniya informacionnoy sistemy // Informatizaciya i svyaz'. 2018. № 5. C. 51-56.

29. Korobko I. Centralizovanno menyaem paroli lokal'nogo sistemnogo administratora // Sistemnyy administrator. 2006. № 6 (43). S. 30-32.

30. Taneski V., Heričko M., Brumen B. Impact of security education on password change // 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). 2015. PP. 1350-1355.

31. Ob utverzhdenii trebovaniy o zaschite informacii, ne sostavlyayuschey gosudarstvennuyu taynu, soderzhascheysya v gosudarstvennyh informacionnyh sistemah: Prikaz FSTEK ot 11 fevralya 2013 g. № 17.

32. Maksimova E.A. Modeli i metody ocenki informacionnoy bezopasnosti sub'ektov kriticheskoy informacionnoy infrastruktury pri destruktivnyh vozdeystviyah infrastrukturnogo geneza: dis. …. d-ra tehn. nauk: 2.3.6 / Maksimova Elena Aleksandrovna. Sankt-Peterburg, 2022. 448 s.

33. Buynevich M.V., Izrailov K.E. Antropomorficheskiy podhod k opisaniyu vzaimodeystviya uyazvimostey v programmnom kode. Chast' 1: Tipy vzaimodeystviy // Zaschita informacii. Insayd. 2019. № 5(89). S. 78-85.

34. Buynevich M.V., Izrailov K.E. Antropomorficheskiy podhod k opisaniyu vzaimodeystviya uyazvimostey v programmnom kode. Chast' 2: Metrika uyazvimostey // Zaschita informacii. Insayd. 2019. № 6(90). S. 61-65.

35. Maksimova E.A., Buynevich M.V. Metod ocenki infrastrukturnoy ustoychivosti sub'ektov kriticheskoy informacionnoy infrastruktury // Vestnik UrFO. Bezopasnost' v informacionnoy sfere. 2022. № 1 (43). S. 50-63.

36. Maksimova E.A., Buynevich M.V., Shestakov A.V. Proaktivnoe upravlenie informacionnoy bezopasnost'yu sub'ektov kriticheskoy informacionnoy infrastruktury kak slozhnyh organizacionnyh sistem s dinamicheski izmenyayuscheysya strukturoy // Vestnik Voronezhskogo instituta MVD Rossii. 2023. № 2. S. 49-59.

37. Rusakov A.M., Maksimova E.A. Proaktivnaya ocenka dinamiki riskov infrastrukturnogo destruktivizma dlya raspredelennoy sistemy raspoznavaniya lic // Zaschita informacii. Insayd. 2025. № 4(124). S. 66-71. EDN UMBYME.

38. Rusakov A.M. Kompleks antropomorficheskih modeley povedencheskogo analiza processov dlya obnaruzheniya effektov infrastrukturnogo destruktivizma // Inzhenernyy vestnik Dona. 2024. № 11(119). S. 391-404. EDN DLHUZQ.

39. Rusakov A.M. Algoritmicheskaya realizaciya modeli ocenki effektov infrastrukturnogo destruktivizma informacionno-tehnologicheskoy infrastruktury // Sovremennaya nauka: aktual'nye problemy teorii i praktiki. Seriya: Estestvennye i tehnicheskie nauki. 2025. № 1. S. 121-128. DOIhttps://doi.org/10.37882/2223-2966.2025.01.35.

40. Svidetel'stvo o gosudarstvennoy registracii programmy dlya EVM № 2022685869 Rossiyskaya Federaciya. Programmnoe obespechenie sistemy modelirovaniya mezhob'ektnyh sistemnyh svyazey infrastrukturnogo haraktera v informacionnyh sistemah: № 2022685248: zayavl. 15.12.2022: opubl. 28.12.2022 / A. M. Rusakov. EDN BYQWMV.

41. Svidetel'stvo o gosudarstvennoy registracii programmy dlya EVM № 2025614582 Rossiyskaya Federaciya. Intellektual'naya sistema povedencheskogo analiza processov v informacionno-tehnologicheskoy infrastrukture na osnove antropomorficheskih tipov vzaimodeystviya: zayavl. 12.02.2025: opubl. 24.02.2025 / A. M. Rusakov. EDN GRIKOF.

42. Rusakov A.M. Prognozirovanie riskov infrastrukturnogo destruktivizma s pomosch'yu antropomorficheskogo podhoda dlya servisnoy arhitektury // Zaschita informacii. Insayd. 2025. № 2(122). S. 32-37.

43. Rusakov A.M. Prognozirovanie riskov infrastrukturnogo destruktivizma na osnove analiza zhurnalov sobytiy oblachnoy platformy Openstack // Aktual'nye problemy prikladnoy matematiki, informatiki i mehaniki: Sbornik trudov Mezhdunarodnoy nauchnoy konferencii, Voronezh, 02–04 dekabrya 2024 goda. Voronezh: Nauchno-issledovatel'skie publikacii, 2025. S. 955-960. EDN JFAPXX.

44. Buynevich D.V., Matveev A.V., Pokusov V.V. Sposob ocenki informacionno-tehnicheskogo vzaimodeystviya. Chast' 1. Modeli informacionnyh sistem // Nauchno-analiticheskiy zhurnal Vestnik Sankt-Peterburgskogo universiteta Gosudarstvennoy protivopozharnoy sluzhby MChS Rossii. 2020. № 3. S. 108-116.

45. Buynevich D.V., Matveev A.V., Pokusov V.V. Sposob ocenki informacionno-tehnicheskogo vzaimodeystviya. Chast' 2. Metrika bezopasnosti // Nauchno-analiticheskiy zhurnal Vestnik Sankt-Peterburgskogo universiteta Gosudarstvennoy protivopozharnoy sluzhby MChS Rossii. 2020. № 4. S. 95-102.

46. Pokusov V.V. Sinergeticheskie effekty vzaimodeystviya moduley sistemy obespecheniya informacionnoy bezopasnosti // Informatizaciya i svyaz'. 2018. № 3. S. 61-67.

47. Pokusov V.V. Ocenka effektivnosti sistemy obespecheniya IB. Chast' 1. Pokazateli i modeli predstavleniya // Zaschita informacii. Insayd. 2019. № 2 (86). S. 54-60.

48. Pokusov V.V. Ocenka effektivnosti sistemy obespecheniya IB. Chast' 2. Metodika i rezul'taty // Zaschita informacii. Insayd. 2019. № 3 (87). S. 64-72.

49. Slukin S.V., Smetankina G.I. Principy formirovaniya racional'nyh variantov informacionno-tehnicheskogo vzaimodeystviya v ASU MChS Rossii // Pozharnaya bezopasnost': problemy i perspektivy. 2018. T. 1. № 9. S. 826-829.

50. Levchunec I.V., Ashadeev A.I. Abstraktnaya model' informacionnoy bezopasnosti pri informacionno-tehnicheskom vzaimodeystvii avtomatizirovannyh sistem // Sovershenstvovanie Edinoy gosudarstvennoy sistemy preduprezhdeniya i likvidacii chrezvychaynyh situaciy i grazhdanskoy oborony Rossiyskoy Federacii na sovremennom etape: sbornik trudov XXX Mezhdunarodnoy nauchno-prakticheskoy konferencii. 2020. S. 71-75.

51. Pokusov V.V. Format protokola universal'nogo informacionno-tehnicheskogo vzaimodeystviya v sisteme obespecheniya informacionnoy bezopasnosti «UITV-SOIB» // Telekommunikacii. 2019. № 9. S. 33-40.

52. Izrailov K.E., Pokusov V.V., Stolyarova E.S. Informacionnye ob'ekty v sisteme obespecheniya informacionnoy bezopasnosti // Teoreticheskie i prikladnye voprosy kompleksnoy bezopasnosti: materialy I Mezhdunarodnoy nauchno-prakticheskoy konferencii. Petrovskaya akademiya nauk i iskusstv. 2018. S. 166-169.

53. Pokusov V.V. Formalizaciya i opredelenie korrektnosti protokola informacionno-tehnicheskogo vzaimodeystviya (na primere integrirovannoy sistemy zaschity informacii) // Informatizaciya i svyaz'. 2021. № 2. S. 55-68.

54. Gluhov N.I., Nasedkin P.N. Ontologicheskie modeli v processe upravleniya informacionnymi riskami i informacionnoy bezopasnosti hozyaystvuyuschih sub'ektov // Informacionnye tehnologii i matematicheskoe modelirovanie v upravlenii slozhnymi sistemami. 2020. № 2 (7). S. 24-31.

55. Niyazova R.S., Budanova N. Ontologicheskaya model' processa obespecheniya informacionnoy bezopasnosti // Otkrytye semanticheskie tehnologii proektirovaniya intellektual'nyh sistem. 2015. № 5. S. 169-172.

56. Buynevich M.V., Izrailov K.E., Pokusov V.V. Model' ugroz informacionno-tehnicheskogo vzaimodeystviya v integrirovannoy sisteme zaschity informacii // Informatizaciya i svyaz'. 2021. № 4. S. 66-73.

57. Kurta P.A. Vzaimodeystvie pol'zovatelya s informacionnoy sistemoy. Chast' 2. Algoritmy obnaruzheniya nedostatkov // Izvestiya SPbGETU LETI. 2020. № 10. S. 34-44.

58. Kurta P.A. Vzaimodeystvie pol'zovatelya s informacionnoy sistemoy. Chast' 1. Shema vzaimodeystviya i klassifikaciya nedostatkov // Izvestiya SPbGETU LETI. 2020. № 8-9. S. 35-45.

59. Sidorov G.V. Issledovanie modeli ugroz dlya chastnoy seti IP-Telefonii // Nauka v sovremennom obschestve: zakonomernosti i tendencii razvitiya: sbornik statey po itogam Mezhdunarodnoy nauchno-prakticheskoy konferencii. 2018. S. 55-57.

60. Korochencev D.A., Kuhtinov V.N. Programmnoe sredstvo postroeniya chastnoy modeli ugroz bezopasnosti informacionnoy sistemy personal'nyh dannyh // Colloquium-journal. 2019. № 12-2 (36). S. 92-94.

61. Voronin V.V., Suhorukov Ya.P. Aspekty razrabotki chastnoy modeli ugroz bezopasnosti informacii v tipovyh informacionnyh sistemah // Vestnik Priamurskogo gosudarstvennogo universiteta im. Sholom-Aleyhema. 2020. № 1 (38). S. 24-33.

62. Shakirova R.A., Zakoldaev D.A. Razrabotka algoritma processa proektirovaniya chastnoy modeli ugroz bezopasnosti personal'nyh dannyh // Novyy vzglyad. Mezhdunarodnyy nauchnyy vestnik. 2015. № 8. S. 165-168.

63. Tischenko E.N., Shkaranda E.Yu. Algoritmizaciya processa formirovaniya chastnoy modeli ugroz bezopasnosti personal'nyh dannyh // Izvestiya YuFU. Tehnicheskie nauki. 2013. № 12 (149). S. 180-187.

64. Vasil'eva O.V., Zhigulin G.P. Sposob formirovaniya modeli ugroz i narushiteley informacionnoy bezopasnosti chastnoy oblachnoy infrastruktury // Nauchno-tehnicheskiy vestnik Povolzh'ya. 2014. № 1. S. 78-80.

65. Glaz'ev S.Yu. Teoriya dolgosrochnogo tehniko-ekonomicheskogo razvitiya. M.: VlaDar, 1993. EDN:YSXIUV

66. Nil'sen E. Prakticheskiy analiz vremennyh ryadov. Prognozirovanie so statistikoy i mashinnoe obuchenie. SPb.: Dialektika, 2021 544 s.

67. Hayndman R., Atanasopulos Dzh. Prognozirovanie: principy i praktika. Per. s angl. M.: DMK Press, 2023. 458 s.

68. Naumov V.N., Buynevich M.V., Sineschuk M.Yu., Tukmacheva M.A. Analiz i prognozirovanie vremennyh ryadov kiberatak na informacionnuyu sistemu vedomstvennogo vuza: vozmozhnosti i ogranicheniya metodov // Trudy uchebnyh zavedeniy svyazi. 2025. T. 11. № 1. S. 118‒131. DOIhttps://doi.org/10.31854/1813-324X-2025-11-1-118-131. EDN:OOPJJR

69. Isaev S.V., Kononov D.D. Issledovanie dinamiki i klassifikaciya atak na veb-servisy korporativnoy seti // Sibirskiy aerokosmicheskiy zhurnal. 2022. T. 23. № 4. S. 593–601. DOIhttps://doi.org/10.31772/2712-8970-2022-23-4-593-601. EDN:RUSJWB

70. Zuzčák M., Bujok P. Using honeynet data and a time series to predict the number of cyber attacks // Computer Science and Information Systems. 2021. Vol. 18. Iss. 4. PP. 1197–1217. DOIhttps://doi.org/10.2298/CSIS200715040Z

71. Larionov K.O. Prognozirovanie statisticheskih dannyh atak na prikladnoe programmnoe obespechenie // Problemy sovremennoy nauki i obrazovaniya. 2021. № 6(163). S. 57‒63. DOIhttps://doi.org/10.24411/2304-2338-2021-10606. EDN:PGVALC

72. Hobijn B., Franses P.H., Ooms M. Generalization of the KPSS-test for stationarity // Statistica Neerlandica. 2004. Vol. 58. Iss. 4. PP. 482‒502. DOIhttps://doi.org/10.1111/j.1467-9574.2004.00272.x

73. Phillips P.C.B., Perron P. Testing for a Unit Root in Time Series Regression // Biometrika. 1988. Vol. 75. Iss. 2. PP. 335‒346. DOIhttps://doi.org/10.1093/biomet/75.2.335. EDN:ILNEET

74. Hersbach H. Decomposition of the Continuous Ranked Probability Score for Ensemble Prediction Systems // Weather and Forecast. 2000. Vol. 15. Iss. 5. PP. 559–570. DOIhttps://doi.org/10.1175/1520-0434(2000)015<0559:DOTCRP>2.0.CO;2

75. Dawid A.P., Sebastiani P. Coherent Dispersion Criteria for Optimal Experimental Design // Annals of Statistics. 1999. Vol. 27. Iss. 1. PP. 65‒81.

76. Bickel P.J., Doksum K.A. An Analysis of Transformations // Journal of the American Statistical Association. 1981. Vol. 76. Iss. 374. PP. 296‒311. DOIhttps://doi.org/10.2307/2287831

77. Hyndman R.J., Koehler A.B., Snyder R.D., Grose S. A state space framework for automatic forecasting using exponential smoothing methods // International Journal Forecasting. 2002. Vol. 18. Iss. 3. PP. 439–454.

78. Cleveland R.B., Cleveland W.S., McRae J.E., Terpenning I.J. STL: A Seasonal-Trend Decomposition Procedure Based on Loess // Journal of Official Statistics. 1990. Vol. 6. Iss. 1. PP. 3–33.

79. Scott S., Varian H.R. Predicting the Present with Bayesian Structural Time Series // SSRN Electronic Journal. 2014. Vol. 5. Iss. 1/2. PP. 4–23. DOIhttps://doi.org/10.1504/IJMMNO.2014.059942

80. Mastickiy S.E. Analiz vremennyh ryadov s pomosch'yu R. 2020. URL: https://ranalytics.github.io/tsa-with-r (data obrascheniya 13.10.2025)

81. Abdullin T.I., Baev V.D., Buynevich M.V., Burzunov D.D., Vasil'eva I.N., Galiullina E.F. i dr. Cifrovye tehnologii i problemy informacionnoy bezopasnosti: monografiya. SPb: SPGEU 2021. 163 s.

82. Leonov N.V. Protivodeystvie uyazvimostyam programmnogo obespecheniya. Chast' 1. Ontologicheskaya model' // Voprosy kiberbezopasnosti. 2024. № 2 (60). S. 87-92. DOI:https://doi.org/10.21681/2311-3456-2024-2-87-92

83. Leonov N.V. Protivodeystvie uyazvimostyam programmnogo obespecheniya. Chast' 2. Analiticheskaya model' i konceptual'nye resheniya // Voprosy kiberbezopasnosti. 2024. № 3 (61). S. 90-95. DOI:https://doi.org/10.21681/2311-3456-2024-3-90-95

84. He Y., Zhou H., Zhang S., Lu S., Yan Y., Li R., Gao Y. Research on Evaluation Model and Algorithm of Information System Health State Based on Realtime Operation Data and Analytic Hierarchy Process // The proceedings of International Conference on Networking, Communications and Information Technology (Manchester, United Kingdom, 26-27 December 2021). 2020. PP. 353-356. DOI:https://doi.org/10.1109/NetCIT54147.2021.00077

85. Shimchik N.V., Ignat'ev V.N., Belevancev A.A. IRBIS: Staticheskiy analizator pomechennyh dannyh dlya poiska uyazvimostey v programmah na C/C++ // Trudy Instituta sistemnogo programmirovaniya RAN. 2022. T. 34. № 6. S. 51-66. DOI:https://doi.org/10.15514/ISPRAS-2022-34(6)-4.

86. Brovko E.V., Zaycev V.V. Metod poiska uyazvimostey v programmnom kode s ispol'zovaniem svertochnoy neyronnoy seti // Metody i tehnicheskie sredstva obespecheniya bezopasnosti informacii. 2024. № 33. S. 3-5.

87. Jones A., Omar M. Harnessing the Efficiency of Reformers to Detect Software Vulnerabilities // The proceedings of Congress in Computer Science, Computer Engineering, & Applied Computing (Las Vegas, NV, USA, 24-27 July 2023). 2023. PP. 2259-2264. DOI:https://doi.org/10.1109/CSCE60160.2023.00368.

88. Kulagin I.I., Padaryan V.A., Koshkin V.A. O metodah izvlecheniya algoritmov iz binarnogo koda // Trudy Instituta sistemnogo programmirovaniya RAN. 2024. T. 36. № 3. S. 139-160. DOI:https://doi.org/10.15514/ISPRAS-2024-36(3)-10.

89. Gavshin D.A. Ispol'zovanie instrumentov Ghidra dlya analiza faylov UEFI // Vestnik molodyh uchenyh Sankt-Peterburgskogo gosudarstvennogo universiteta tehnologii i dizayna. 2021. № 4. S. 39-43.

90. Xia B., Ge Y., Yang R., Yin J., Pang J., Tang C. BContext2Name: Naming Functions in Stripped Binaries with Multi-Label Learning and Neural Networks // The proceedings of IEEE 10th International Conference on Cyber Security and Cloud Computing / 2023 IEEE 9th International Conference on Edge Computing and Scalable Cloud (Xiangtan, Hunan, China, 01-03 July 2023). 2023. PP. 167-172. DOI:https://doi.org/10.1109/CSCloud-EdgeCom58631.2023.00037

91. Izrailov K.E. Koncepciya geneticheskoy deevolyucii predstavleniy programmy. Chast' 1 // Voprosy kiberbezopasnosti. 2024. № 1 (59). S. 61-66. DOI:https://doi.org/10.21681/2311-3456-2024-1-61-66.

92. Izrailov K.E. Koncepciya geneticheskoy deevolyucii predstavleniy programmy. Chast' 2 // Voprosy kiberbezopasnosti. 2024. № 2 (60). S. 81-86. DOI:https://doi.org/10.21681/2311-3456-2024-2-81-86.

Login or Create
* Forgot password?