Subjects -> COMPUTER SCIENCE (Total: 2313 journals)
    - ANIMATION AND SIMULATION (33 journals)
    - ARTIFICIAL INTELLIGENCE (133 journals)
    - AUTOMATION AND ROBOTICS (116 journals)
    - CLOUD COMPUTING AND NETWORKS (75 journals)
    - COMPUTER ARCHITECTURE (11 journals)
    - COMPUTER ENGINEERING (12 journals)
    - COMPUTER GAMES (23 journals)
    - COMPUTER PROGRAMMING (25 journals)
    - COMPUTER SCIENCE (1305 journals)
    - COMPUTER SECURITY (59 journals)
    - DATA BASE MANAGEMENT (21 journals)
    - DATA MINING (50 journals)
    - E-BUSINESS (21 journals)
    - E-LEARNING (30 journals)
    - ELECTRONIC DATA PROCESSING (23 journals)
    - IMAGE AND VIDEO PROCESSING (42 journals)
    - INFORMATION SYSTEMS (109 journals)
    - INTERNET (111 journals)
    - SOCIAL WEB (61 journals)
    - SOFTWARE (43 journals)
    - THEORY OF COMPUTING (10 journals)

COMPUTER SCIENCE (1305 journals)                  1 2 3 4 5 6 7 | Last

Showing 1 - 200 of 872 Journals sorted alphabetically
3D Printing and Additive Manufacturing     Full-text available via subscription   (Followers: 27)
Abakós     Open Access   (Followers: 3)
ACM Computing Surveys     Hybrid Journal   (Followers: 29)
ACM Inroads     Full-text available via subscription   (Followers: 1)
ACM Journal of Computer Documentation     Free   (Followers: 4)
ACM Journal on Computing and Cultural Heritage     Hybrid Journal   (Followers: 5)
ACM Journal on Emerging Technologies in Computing Systems     Hybrid Journal   (Followers: 11)
ACM SIGACCESS Accessibility and Computing     Free   (Followers: 2)
ACM SIGAPP Applied Computing Review     Full-text available via subscription  
ACM SIGBioinformatics Record     Full-text available via subscription  
ACM SIGEVOlution     Full-text available via subscription  
ACM SIGHIT Record     Full-text available via subscription  
ACM SIGHPC Connect     Full-text available via subscription  
ACM SIGITE Newsletter     Open Access   (Followers: 1)
ACM SIGMIS Database: the DATABASE for Advances in Information Systems     Hybrid Journal  
ACM SIGUCCS plugged in     Full-text available via subscription  
ACM SIGWEB Newsletter     Full-text available via subscription   (Followers: 3)
ACM Transactions on Accessible Computing (TACCESS)     Hybrid Journal   (Followers: 3)
ACM Transactions on Algorithms (TALG)     Hybrid Journal   (Followers: 13)
ACM Transactions on Applied Perception (TAP)     Hybrid Journal   (Followers: 3)
ACM Transactions on Architecture and Code Optimization (TACO)     Hybrid Journal   (Followers: 9)
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP)     Hybrid Journal  
ACM Transactions on Autonomous and Adaptive Systems (TAAS)     Hybrid Journal   (Followers: 10)
ACM Transactions on Computation Theory (TOCT)     Hybrid Journal   (Followers: 11)
ACM Transactions on Computational Logic (TOCL)     Hybrid Journal   (Followers: 5)
ACM Transactions on Computer Systems (TOCS)     Hybrid Journal   (Followers: 19)
ACM Transactions on Computer-Human Interaction     Hybrid Journal   (Followers: 15)
ACM Transactions on Computing Education (TOCE)     Hybrid Journal   (Followers: 9)
ACM Transactions on Computing for Healthcare     Hybrid Journal  
ACM Transactions on Cyber-Physical Systems (TCPS)     Hybrid Journal   (Followers: 1)
ACM Transactions on Design Automation of Electronic Systems (TODAES)     Hybrid Journal   (Followers: 5)
ACM Transactions on Economics and Computation     Hybrid Journal  
ACM Transactions on Embedded Computing Systems (TECS)     Hybrid Journal   (Followers: 4)
ACM Transactions on Information Systems (TOIS)     Hybrid Journal   (Followers: 18)
ACM Transactions on Intelligent Systems and Technology (TIST)     Hybrid Journal   (Followers: 11)
ACM Transactions on Interactive Intelligent Systems (TiiS)     Hybrid Journal   (Followers: 6)
ACM Transactions on Internet of Things     Hybrid Journal   (Followers: 2)
ACM Transactions on Modeling and Performance Evaluation of Computing Systems (ToMPECS)     Hybrid Journal  
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)     Hybrid Journal   (Followers: 10)
ACM Transactions on Parallel Computing     Full-text available via subscription  
ACM Transactions on Reconfigurable Technology and Systems (TRETS)     Hybrid Journal   (Followers: 6)
ACM Transactions on Sensor Networks (TOSN)     Hybrid Journal   (Followers: 9)
ACM Transactions on Social Computing     Hybrid Journal  
ACM Transactions on Spatial Algorithms and Systems (TSAS)     Hybrid Journal   (Followers: 1)
ACM Transactions on Speech and Language Processing (TSLP)     Hybrid Journal   (Followers: 11)
ACM Transactions on Storage     Hybrid Journal  
ACS Applied Materials & Interfaces     Hybrid Journal   (Followers: 39)
Acta Informatica Malaysia     Open Access  
Acta Universitatis Cibiniensis. Technical Series     Open Access   (Followers: 1)
Ad Hoc Networks     Hybrid Journal   (Followers: 12)
Adaptive Behavior     Hybrid Journal   (Followers: 8)
Additive Manufacturing Letters     Open Access   (Followers: 3)
Advanced Engineering Materials     Hybrid Journal   (Followers: 32)
Advanced Science Letters     Full-text available via subscription   (Followers: 9)
Advances in Adaptive Data Analysis     Hybrid Journal   (Followers: 9)
Advances in Artificial Intelligence     Open Access   (Followers: 31)
Advances in Catalysis     Full-text available via subscription   (Followers: 7)
Advances in Computational Mathematics     Hybrid Journal   (Followers: 20)
Advances in Computer Engineering     Open Access   (Followers: 13)
Advances in Computer Science : an International Journal     Open Access   (Followers: 18)
Advances in Computing     Open Access   (Followers: 3)
Advances in Data Analysis and Classification     Hybrid Journal   (Followers: 52)
Advances in Engineering Software     Hybrid Journal   (Followers: 26)
Advances in Geosciences (ADGEO)     Open Access   (Followers: 19)
Advances in Human-Computer Interaction     Open Access   (Followers: 19)
Advances in Image and Video Processing     Open Access   (Followers: 20)
Advances in Materials Science     Open Access   (Followers: 19)
Advances in Multimedia     Open Access   (Followers: 1)
Advances in Operations Research     Open Access   (Followers: 13)
Advances in Remote Sensing     Open Access   (Followers: 59)
Advances in Science and Research (ASR)     Open Access   (Followers: 8)
Advances in Technology Innovation     Open Access   (Followers: 5)
AEU - International Journal of Electronics and Communications     Hybrid Journal   (Followers: 8)
African Journal of Information and Communication     Open Access   (Followers: 6)
African Journal of Mathematics and Computer Science Research     Open Access   (Followers: 5)
AI EDAM     Hybrid Journal   (Followers: 2)
Air, Soil & Water Research     Open Access   (Followers: 6)
AIS Transactions on Human-Computer Interaction     Open Access   (Followers: 5)
Al-Qadisiyah Journal for Computer Science and Mathematics     Open Access   (Followers: 2)
AL-Rafidain Journal of Computer Sciences and Mathematics     Open Access   (Followers: 3)
Algebras and Representation Theory     Hybrid Journal  
Algorithms     Open Access   (Followers: 13)
American Journal of Computational and Applied Mathematics     Open Access   (Followers: 8)
American Journal of Computational Mathematics     Open Access   (Followers: 6)
American Journal of Information Systems     Open Access   (Followers: 4)
American Journal of Sensor Technology     Open Access   (Followers: 2)
Analog Integrated Circuits and Signal Processing     Hybrid Journal   (Followers: 15)
Animation Practice, Process & Production     Hybrid Journal   (Followers: 4)
Annals of Combinatorics     Hybrid Journal   (Followers: 3)
Annals of Data Science     Hybrid Journal   (Followers: 14)
Annals of Mathematics and Artificial Intelligence     Hybrid Journal   (Followers: 16)
Annals of Pure and Applied Logic     Open Access   (Followers: 4)
Annals of Software Engineering     Hybrid Journal   (Followers: 12)
Annual Reviews in Control     Hybrid Journal   (Followers: 7)
Anuario Americanista Europeo     Open Access  
Applicable Algebra in Engineering, Communication and Computing     Hybrid Journal   (Followers: 3)
Applied and Computational Harmonic Analysis     Full-text available via subscription  
Applied Artificial Intelligence: An International Journal     Hybrid Journal   (Followers: 17)
Applied Categorical Structures     Hybrid Journal   (Followers: 4)
Applied Clinical Informatics     Hybrid Journal   (Followers: 4)
Applied Computational Intelligence and Soft Computing     Open Access   (Followers: 16)
Applied Computer Systems     Open Access   (Followers: 6)
Applied Computing and Geosciences     Open Access   (Followers: 3)
Applied Mathematics and Computation     Hybrid Journal   (Followers: 31)
Applied Medical Informatics     Open Access   (Followers: 11)
Applied Numerical Mathematics     Hybrid Journal   (Followers: 4)
Applied Soft Computing     Hybrid Journal   (Followers: 13)
Applied Spatial Analysis and Policy     Hybrid Journal   (Followers: 5)
Applied System Innovation     Open Access   (Followers: 1)
Archive of Applied Mechanics     Hybrid Journal   (Followers: 4)
Archive of Numerical Software     Open Access  
Archives and Museum Informatics     Hybrid Journal   (Followers: 97)
Archives of Computational Methods in Engineering     Hybrid Journal   (Followers: 5)
arq: Architectural Research Quarterly     Hybrid Journal   (Followers: 7)
Array     Open Access   (Followers: 1)
Artifact : Journal of Design Practice     Open Access   (Followers: 8)
Artificial Life     Hybrid Journal   (Followers: 7)
Asian Journal of Computer Science and Information Technology     Open Access   (Followers: 3)
Asian Journal of Control     Hybrid Journal  
Asian Journal of Research in Computer Science     Open Access   (Followers: 4)
Assembly Automation     Hybrid Journal   (Followers: 2)
Automatic Control and Computer Sciences     Hybrid Journal   (Followers: 6)
Automatic Documentation and Mathematical Linguistics     Hybrid Journal   (Followers: 5)
Automatica     Hybrid Journal   (Followers: 13)
Automatika : Journal for Control, Measurement, Electronics, Computing and Communications     Open Access  
Automation in Construction     Hybrid Journal   (Followers: 8)
Balkan Journal of Electrical and Computer Engineering     Open Access  
Basin Research     Hybrid Journal   (Followers: 7)
Behaviour & Information Technology     Hybrid Journal   (Followers: 32)
BenchCouncil Transactions on Benchmarks, Standards, and Evaluations     Open Access   (Followers: 3)
Big Data and Cognitive Computing     Open Access   (Followers: 5)
Big Data Mining and Analytics     Open Access   (Followers: 10)
Biodiversity Information Science and Standards     Open Access   (Followers: 1)
Bioinformatics     Hybrid Journal   (Followers: 216)
Bioinformatics Advances : Journal of the International Society for Computational Biology     Open Access   (Followers: 1)
Biomedical Engineering     Hybrid Journal   (Followers: 11)
Biomedical Engineering and Computational Biology     Open Access   (Followers: 11)
Briefings in Bioinformatics     Hybrid Journal   (Followers: 43)
British Journal of Educational Technology     Hybrid Journal   (Followers: 93)
Bulletin of Taras Shevchenko National University of Kyiv. Series: Physics and Mathematics     Open Access  
c't Magazin fuer Computertechnik     Full-text available via subscription   (Followers: 1)
Cadernos do IME : Série Informática     Open Access  
CALCOLO     Hybrid Journal  
CALICO Journal     Full-text available via subscription  
Calphad     Hybrid Journal  
Canadian Journal of Electrical and Computer Engineering     Full-text available via subscription   (Followers: 14)
Catalysis in Industry     Hybrid Journal  
CCF Transactions on High Performance Computing     Hybrid Journal  
CCF Transactions on Pervasive Computing and Interaction     Hybrid Journal  
CEAS Space Journal     Hybrid Journal   (Followers: 6)
Cell Communication and Signaling     Open Access   (Followers: 3)
Central European Journal of Computer Science     Hybrid Journal   (Followers: 4)
CERN IdeaSquare Journal of Experimental Innovation     Open Access  
Chaos, Solitons & Fractals     Hybrid Journal   (Followers: 1)
Chaos, Solitons & Fractals : X     Open Access   (Followers: 1)
Chemometrics and Intelligent Laboratory Systems     Hybrid Journal   (Followers: 13)
ChemSusChem     Hybrid Journal   (Followers: 7)
China Communications     Full-text available via subscription   (Followers: 8)
Chinese Journal of Catalysis     Full-text available via subscription   (Followers: 2)
Chip     Full-text available via subscription   (Followers: 2)
Ciencia     Open Access  
CIN : Computers Informatics Nursing     Hybrid Journal   (Followers: 11)
Circuits and Systems     Open Access   (Followers: 16)
CLEI Electronic Journal     Open Access  
Clin-Alert     Hybrid Journal   (Followers: 1)
Clinical eHealth     Open Access  
Cluster Computing     Hybrid Journal   (Followers: 1)
Cognitive Computation     Hybrid Journal   (Followers: 2)
Cognitive Computation and Systems     Open Access  
COMBINATORICA     Hybrid Journal  
Combinatorics, Probability and Computing     Hybrid Journal   (Followers: 4)
Combustion Theory and Modelling     Hybrid Journal   (Followers: 18)
Communication Methods and Measures     Hybrid Journal   (Followers: 12)
Communication Theory     Hybrid Journal   (Followers: 29)
Communications in Algebra     Hybrid Journal   (Followers: 1)
Communications in Partial Differential Equations     Hybrid Journal   (Followers: 2)
Communications of the ACM     Full-text available via subscription   (Followers: 59)
Communications of the Association for Information Systems     Open Access   (Followers: 15)
Communications on Applied Mathematics and Computation     Hybrid Journal   (Followers: 1)
COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering     Hybrid Journal   (Followers: 4)
Complex & Intelligent Systems     Open Access   (Followers: 1)
Complex Adaptive Systems Modeling     Open Access  
Complex Analysis and Operator Theory     Hybrid Journal   (Followers: 2)
Complexity     Hybrid Journal   (Followers: 8)
Computación y Sistemas     Open Access  
Computation     Open Access   (Followers: 1)
Computational and Applied Mathematics     Hybrid Journal   (Followers: 3)
Computational and Mathematical Methods     Hybrid Journal  
Computational and Mathematical Methods in Medicine     Open Access   (Followers: 2)
Computational and Mathematical Organization Theory     Hybrid Journal   (Followers: 1)
Computational and Structural Biotechnology Journal     Open Access   (Followers: 1)
Computational and Theoretical Chemistry     Hybrid Journal   (Followers: 11)
Computational Astrophysics and Cosmology     Open Access   (Followers: 6)
Computational Biology and Chemistry     Hybrid Journal   (Followers: 13)
Computational Biology Journal     Open Access   (Followers: 6)
Computational Brain & Behavior     Hybrid Journal   (Followers: 1)
Computational Chemistry     Open Access   (Followers: 3)
Computational Communication Research     Open Access   (Followers: 1)
Computational Complexity     Hybrid Journal   (Followers: 5)
Computational Condensed Matter     Open Access   (Followers: 1)

        1 2 3 4 5 6 7 | Last

Similar Journals
Journal Cover
Automatic Control and Computer Sciences
Journal Prestige (SJR): 0.218
Citation Impact (citeScore): 1
Number of Followers: 6  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 1558-108X - ISSN (Online) 0146-4116
Published by Springer-Verlag Homepage  [2469 journals]
  • Duplication of Boolean Complements for Synthesis of Fault-Tolerant Digital
           Devices and Systems

    • Free pre-print version: Loading...

      Abstract: A new architecture for the synthesis of fault-tolerant digital devices, which is easier to implement as compared to the well-known architecture based on triple modular redundancy (TMR), is proposed. The architecture is implemented based on the Boolean complement principle, which implies the use of a special control block for evaluating complement functions, rather than by introducing exact copies of an original circuit. In practice, its complexity can be significantly lower than the complexity of the original circuit. This makes it possible to synthesize fault-tolerant devices with simpler designs as compared to TMR-based devices. The proposed architecture consists of three blocks: the original circuit, the signal error detection circuit, and the signal correction circuit. The synthesis of a fault-tolerant digital device is aimed at generating the structure of the signal error detection circuit, which implements the idea of duplication of complements. The advantages and disadvantages of the proposed fault-tolerant architecture are discussed. The results of experiments on some combinational benchmarks, which demonstrate the effectiveness of the proposed approach, are presented.
      PubDate: 2022-02-01
       
  • The Design of an Expressway Lighting and Early Warning System Based on MCU

    • Free pre-print version: Loading...

      Abstract: There is a design of an expressway lighting and early warning system based on MCU, and the corresponding control method is proposed in this paper. The system and its control method can realize the lighting and direction guidance of the vehicles on the expressway under different situations. The different colors of lights are used to remind the vehicle of the different driving situation. The emergent buttons and GSM module can realize help-calling for people in distress in the expressway and can also be used for road maintenance personnel to locate the worker and check on work attendance. The system and its control method can also realize the vehicle counting function and the calculation of magnitude of traffic flow.
      PubDate: 2022-02-01
       
  • Inter-Organizational Cloud Computing and Robust Scalability in Current
           Scenario and Beyond

    • Free pre-print version: Loading...

      Abstract: Inter-organizational cloud computing model is beneficial for academic institutions. We propose a collaborative inter-institutional cloud learning, where cloud entities can learn the same model cooperatively. The inter-institutional cloud model can reduce network bandwidth costs and ensure privacy. We recommend a trainer to student’s/customer strategy. The key role is to combine a regularization term with the objective function to adjust the gradient of the inter-institutional students/customers under different data. Then, based on the training strategy, a robust federated optimization technique based on joint identification verification is proposed to reduce the number of communication rounds. The main aims of this paper are, first, it can provide a technical platform for cloud services, then institutional resources utilization and opportunistic resources have been evaluated for their overall usage of cloud services and goals. Secondly, our time allocation for cloud computing management workloads is an active area of investigation metrics for the current scenario and control strategy. Experimental results analyze through the different case studies and use the scalability technology compared with the academia and robust scalability techniques.
      PubDate: 2022-02-01
       
  • Hot News Prediction Method Based on Natural Language Processing Technology
           and Its Application

    • Free pre-print version: Loading...

      Abstract: In today’s era of information expansion, there exist a lot of real-time news every day, and there will be a time difference between potential real-time hotspots and hot news. It is time-consuming for IT operators to read all the real-time news and find the hot spots by human effort. Therefore, the prediction of hot news is particularly important for we-media operation. Therefore, this paper attempts to use natural language processing technology to predict hot news and to assist operators to create articles about the hot news. For hot news prediction, this paper proposes a method of data preprocessing and uses several models based on convolutional neural networks (CNNs), text convolutional neural networks (TextCNNs), long-short term memory (LSTM), bi-directional long short-term memory (BiLSTM) to train. We also build a new model—CNN Distinct and BiLSTM Extract, which can be called CDBE for short—to obtain better performance. We evaluate several training models and analyze them by multiple evaluation indexes. In addition, we apply the method proposed in this paper to actual operation work, and the result shows that such can greatly reduce operators’ pressure, save the working time for creating articles about hot news, and greatly improve their work efficiency.
      PubDate: 2022-02-01
       
  • An Improvement on LEACH-C Protocol (LEACH-CCMSN)

    • Free pre-print version: Loading...

      Abstract: Wireless sensor networks (WSNs) are composed of tiny sensors nodes with limited resources, and communicating together to monitor the environment. Sensor nodes are usually powered by battery. Consequently, the energy efficiency is critical for the lifetime of the Wireless sensors network. Routing protocols are the most important issue for WSNs. LEACH (low energy adaptive clustering hierarchy) is one of the first hierarchical routing algorithms for WSNs. LEACH-C (LEACH-centralized) is a variant of LEACH where the cluster heads are selected by the Sink. At the beginning of each round in LEACH-C, the sensor nodes must send information about their current energy to the Sink, which exhausts the sensor node battery. This paper proposes an improved LEACH-C algorithm in which, the Sink uses a consumption mode for each sensor node (CMSN) to estimate the amount of energy needed for the next rounds; so, sensor nodes doesn’t have to send the value of the current energy to the Sink at the beginning of each round. The simulation results and analysis show that our proposed protocol achieve much better performances in terms of energy dissipation and network lifetime compared to LEACH-C.
      PubDate: 2022-02-01
       
  • An Approach for Detecting Anonymized Traffic: Orbot as Case Study

    • Free pre-print version: Loading...

      Abstract: — This work studies Orbot, an anonymous overlay network used to browse the Internet. Its ease of use has attracted all kinds of people, including ordinary Internet users who want to avoid being profiled to bypass censorship, government intelligence agencies that need to do operations on the Internet without being detected and companies who do not want to reveal information to their competitors. This article aims to study, analyze, and mostly identify the Orbot traffic, since much of it is used for illegal purposes. A method of identification of the anonymous network is established by examining the traffic to identify clues. The method used to detect the use of the Orbot application in the network is based on the creation of the rules with Snort IDS from the analysis of the packets in Wireshark analyzer. The encryption aspect of the flow of this anonymous network brings us to a deep packet inspection (DPI). A set of Snort rules were developed as a proof of concept for the proposed Orbot detection approach. Our traffic detection methodology has demonstrated that it can detect Orbot connections in real time.
      PubDate: 2022-02-01
       
  • Automatic Recognition of Welding Seam Defects in TOFD Images Based on
           TensorFlow

    • Free pre-print version: Loading...

      Abstract: This study is aimed to analyze the characteristics of different kinds of time-of-flight diffraction (TOFD) images for welding seam defects. Combined with the image recognition technology of artificial intelligence, a deep learning neural network program based on TensorFlow was developed and applied to the training and recognition of welding seam defects in ultrasonic TOFD images. The results showed that, after training, the program could identify typical welding seam defects such as stoma, crackle, slag inclusion, lack of fusion, and incomplete penetration in TOFD images of the welding seam, and the recognition confidence was more than 0.8. This proved that the program developed in this study provided an effective reference for determining typical welding seam defects in TOFD images of the welding seam.
      PubDate: 2022-02-01
       
  • Classification of Road Pavement Defects Based on Convolution Neural
           Network in Keras

    • Free pre-print version: Loading...

      Abstract: The aim of this paper is to propose the convolution neural network—VGG16 structure in Keras to classify pavement defects. In this paper, we present a method to build an automated system to classify different types of defects such as block cracks, longitudinal cracks and potholes. A region of interest is found and features are extracted using image processing techniques and machine learning methods. This system includes the following steps. The first step is to detect the defect location (ROI), then the defect is described by its features. Finally, each defect is classified based on these different features. The system ensures stable operation in the presence of limited lighting conditions, shadowing, and complex shaped defects.
      PubDate: 2022-02-01
       
  • Fully Integrated Spatial Information to Improve FCM Algorithm for Brain
           MRI Image Segmentation

    • Free pre-print version: Loading...

      Abstract: FCM algorithm is one of the well-known techniques for image segmentation; it is based on an imprecise decision by using the membership function. However, FCM algorithm fails to proceed well enough in the presence of imaging artifacts due to its performance without any consideration of spatial information. In this paper, we propose two crucial modifications to the conventional FCM algorithm to tackle its sensitivity against noise. Firstly, the proposed algorithm provides full consideration of the spatial constraint, wherein the influence of neighboring pixels is defined according to two proposed terms, a fuzzy similarity measure as well as the level of noise. Secondly, we adopt a strategy to select the optimal pixel between the central pixel and its neighboring pixels that can better influence the segmentation performance in terms of compactness and separation information. The proposed algorithm is compared qualitatively and quantitatively with five existing clustering methods in terms of cluster validity functions, segmentation accuracy, tissue segmentation accuracy, and computational time.
      PubDate: 2022-02-01
       
  • A Two-Component Steganographic System Based on the Sum of Linear Functions
           of Two Signals Using a Multiplicative Form of Constraint of Embedded
           Signals

    • Free pre-print version: Loading...

      Abstract: A steganographic system based on linear mixing of two signals and nonlinear communication between container components, which is invariant to masking signal, is considered, and the key coefficient, which provides effective protection of hidden signal from unauthorized recovery, is determined.
      PubDate: 2021-12-01
      DOI: 10.3103/S0146411621080435
       
  • Using Security-through-Obscurity Principle in an Industrial Internet of
           Things

    • Free pre-print version: Loading...

      Abstract: Considering the openness of industrial Internet-of-Things systems as compared with conventional SCADA-like systems, the provision of sustainable and continuous production becomes a more relevant and complex task. This article considers the application of the security-through-obscurity principle as the original method of maintaining production process continuity. An attempt to derive a formula for evaluating the protection level when using this principle is described.
      PubDate: 2021-12-01
      DOI: 10.3103/S0146411621080083
       
  • Using Artificial Neural Networks to Estimate the Probability of
           Information Security Threat Occurrences

    • Free pre-print version: Loading...

      Abstract: This article defines the possibility of using artificial neural networks for evaluating the probability of information safety threat occurrences and the development of a computer program. The result of analyzing the threat occurrence probability has shown that artificial neural networks can be used to evaluate the probability of information security threat occurrence. An application for evaluating the threat occurrence probability is developed.
      PubDate: 2021-12-01
      DOI: 10.3103/S0146411621080046
       
  • An Integrity Control Model for Multidimensional Data Arrays

    • Free pre-print version: Loading...

      Abstract: — Multidimensional data storage systems operating under ravage conditions and designed for storing big volumes of information are considered. An integrity control model based on Pascal’s cryptographic pyramid is presented for multidimensional data arrays.
      PubDate: 2021-12-01
      DOI: 10.3103/S0146411621080368
       
  • Architecture and Operation Algorithm of a Biometric Voice Authentication
           System

    • Free pre-print version: Loading...

      Abstract: A system of authentication/authorization of users with administrative privileges was proposed. A mechanism for enhanced authentication and delegation of authority is proposed, which allows excluding the superuser by creating separate roles: network administrator, security administrator, virtual infrastructure administrator, APCS (automated process control system) administrator. The user authentication/authorization system is based on the use of the characteristics of the fourth formant and the frequency of the leading vowel formant.
      PubDate: 2021-12-01
      DOI: 10.3103/S014641162108006X
       
  • Basic Principles of Creating Control Algorithms for a Remotely Piloted Sea
           Vessel to Improve the Information Security of Noisy Data Transmission
           Channels

    • Free pre-print version: Loading...

      Abstract: In this paper, the principles of creating an algorithm for control and management of a remotely piloted sea vessel are described, along with its structure. The modes of a piloted tugboat motion under the influence of the port-specific interference are considered in detail. The characteristics and methods for calculating the interference effect to ensure the information security of communication channels of an unmanned vessel are presented.
      PubDate: 2021-12-01
      DOI: 10.3103/S0146411621080447
       
  • Organization of Environmental Monitoring of the Port Water Area by
           Processing an Anti-Interference Signal from a Vessel Traffic Control
           System

    • Free pre-print version: Loading...

      Abstract: A crucial task of organizing environmental monitoring of a seaport was considered. The classification of information sources in the environmental monitoring system of the port water area was given. It was shown that it is advisable to use the vessel traffic control radars available in the port, which is justified by economic factors, the possibility of full coverage of the port water area with a radio signal, and the absence of interference sources for radar stations on the port territory. The energy characteristics when sounding the sea surface by ground radars of the vessel traffic control system were considered. The ratios of assessing the quantitative characteristics of the use of radars of the vessel traffic control system for detecting inhomogeneities of sea waves caused by oil and other pollution of the water surface were obtained. The graphical dependences of the signal-to-noise ratio were presented, demonstrating the possibility of using radars of the vessel traffic control system in the port waters for environmental monitoring of the sea surface.
      PubDate: 2021-12-01
      DOI: 10.3103/S0146411621080204
       
  • Software Identification by Standard Machine Learning Tools

    • Free pre-print version: Loading...

      Abstract: This article considers tools for controlling software installed on personal computers of automated system users. The flaws of these software solutions are grounded, and an approach to identifying executable files with the help of a machine learning algorithm is developed and presented. This algorithm consists in the gradient decision tree boosting on the basis of such libraries as XGBoost, LightGBM, CatBoost. The identification of programs with the help of XGBoost and LightGBM is executed. The experimental results are compared with the results of earlier studies conducted by other authors. The findings show that the developed method allows for identifying violations in the adopted security policy during information processing in automated systems.
      PubDate: 2021-12-01
      DOI: 10.3103/S0146411621080459
       
  • Approach to Recognition of Malicious Behavior Based on Autoregression
           Model upon Investigation into Cyberincident

    • Free pre-print version: Loading...

      Abstract: An approach to recognition of malicious behavior based on analysis of the Security.evtx security log of Windows operating system upon investigation into a security incident is given. The use of an autoregression model is experimentally tested (Change Finder algorithm), from which the malicious activity of the users of the domain in the corporate network is revealed.
      PubDate: 2021-12-01
      DOI: 10.3103/S0146411621080290
       
  • Constructing the Model of an Information System for the Automatization of
           Penetration Testing

    • Free pre-print version: Loading...

      Abstract: Some aspects of constructing the model of an information system suitable for further application in the problem of the automatization of penetration testing with the use of reinforcement machine learning methods are considered. The principal requirements to a similar model are formulated, and a prototype architecture of a similar system is proposed.
      PubDate: 2021-12-01
      DOI: 10.3103/S0146411621080216
       
  • Operational Efficiency of Computer Networks under Conditions of Malicious
           Cyber Activity

    • Free pre-print version: Loading...

      Abstract: In this paper, we propose a model for predicting the dynamics of a generalized efficiency index for corporate computer networks operating under conditions of malicious cyber activity. The model represents the dynamics of the index as a function of the operational efficiency of a corporate network at each instant on a certain time interval. In this case, the level of operational efficiency of the network depends on the operational efficiency of its components and is described by a system of differential equations that take into account both malicious activity and the process of eliminating its effects. Under some simplifying conditions, we find analytical solutions of these equations, which significantly facilitates the prediction of the dynamics of the generalized efficiency index.
      PubDate: 2021-12-01
      DOI: 10.3103/S0146411621080332
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 34.231.247.88
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-