Dmitry P. Zegzhda

  • Citations Per Year
Learn More
Lots of upcoming IT trends are based on the concept of heterogeneous networks: Internet of Things is amongst them. Modern heterogeneous networks are characterized by hardly predictable behavior, hundreds of parameters of network nodes and connections and lack of single basis for development of control methods and algorithms. To overcome listed problems one(More)
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model’s safety. The SPR tool makes it possible to analyze security issues on security systems based on the access control model. To illustrate this approach, a case study of the Simple Access Control Model (SACM) is(More)
Rapidly expanding information technologies field clearly discovers tendency of increasing computer systems' heterogeneity and distribution level. In this paper authors reveal the hidden attributes of IT security evolution towards more assumptions about attacker power and less assertions on provided security level. The proposed view of IT security evolution(More)
Internet of things is fast-paced global phenomenon, based on the concept of heterogeneous networks. Modern heterogeneous networks are characterized by hardly predictable behaviour, hundreds of parameters of network nodes and connections, and lack of single basis for development of control methods and algorithms. In this paper authors propose basic(More)
Due to increasing popularity of mobile devices, detection of unknown mobile attack types stays up-to-date, but existing mobile security software aims at detecting known attacks. Offered method of anomaly detection in mobile devices behavior is based on power consumption homogeneity analysis. This method allows to detect deviations in normal behavior for(More)
This paper describes the architecture defects of existing hardware platforms have been analyzed. These defects allow software vulnerabilities exploitation. The authors propose to solve this problem by building a processor with secure-by-design architecture. Requirements for such a processor are formulated within this paper. Also the authors describe the(More)
A new approach is proposed to the calculation of the upper and lower bounds of the multiagent system controllability index formalized as the existence probability of the path from any node to the control center with the message transmission time not larger than the constant t. Controllability is one of the properties of this system that determines the(More)