24 research outputs found

    АвтоматизированноС ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½ΠΈΠ΅ Π°ΠΊΡ‚ΠΈΠ²ΠΎΠ² ΠΈ ΠΎΡ†Π΅Π½ΠΊΠ° ΠΈΡ… критичности для Π°Π½Π°Π»ΠΈΠ·Π° защищСнности ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… систСм

    Get PDF
    ЦСль исслСдования Π·Π°ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ Π² Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚ΠΊΠ΅ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠΈ Π°Π²Ρ‚ΠΎΠΌΠ°Ρ‚ΠΈΠ·ΠΈΡ€ΠΎΠ²Π°Π½Π½ΠΎΠ³ΠΎ выдСлСния Π°ΠΊΡ‚ΠΈΠ²ΠΎΠ² ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы ΠΈ ΡΡ€Π°Π²Π½ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎΠΉ ΠΎΡ†Π΅Π½ΠΊΠΈ уровня ΠΈΡ… критичности для ΠΏΠΎΡΠ»Π΅Π΄ΡƒΡŽΡ‰Π΅ΠΉ ΠΎΡ†Π΅Π½ΠΊΠΈ защищСнности Π°Π½Π°Π»ΠΈΠ·ΠΈΡ€ΡƒΠ΅ΠΌΠΎΠΉ Ρ†Π΅Π»Π΅Π²ΠΎΠΉ инфраструктуры. Под Π°ΠΊΡ‚ΠΈΠ²Π°ΠΌΠΈ Π² Π΄Π°Π½Π½ΠΎΠΌ случаС ΠΏΠΎΠ½ΠΈΠΌΠ°ΡŽΡ‚ΡΡ всС ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎ-тСхнологичСскиС ΠΎΠ±ΡŠΠ΅ΠΊΡ‚Ρ‹ Ρ†Π΅Π»Π΅Π²ΠΎΠΉ инфраструктуры. Π Π°Π·ΠΌΠ΅Ρ€Ρ‹, Ρ€Π°Π·Π½ΠΎΡ€ΠΎΠ΄Π½ΠΎΡΡ‚ΡŒ, ΡΠ»ΠΎΠΆΠ½ΠΎΡΡ‚ΡŒ взаимосвязСй, Ρ€Π°ΡΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Π½ΠΎΡΡ‚ΡŒ ΠΈ Π΄ΠΈΠ½Π°ΠΌΠΈΡ‡Π½ΠΎΡΡ‚ΡŒ соврСмСнных ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… систСм Π·Π°Ρ‚Ρ€ΡƒΠ΄Π½ΡΡŽΡ‚ ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½ΠΈΠ΅ Ρ†Π΅Π»Π΅Π²ΠΎΠΉ инфраструктуры ΠΈ критичности ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎ-тСхнологичСских Π°ΠΊΡ‚ΠΈΠ²ΠΎΠ² для Π΅Π΅ ΠΊΠΎΡ€Ρ€Π΅ΠΊΡ‚Π½ΠΎΠ³ΠΎ функционирования. АвтоматизированноС ΠΈ Π°Π΄Π°ΠΏΡ‚ΠΈΠ²Π½ΠΎΠ΅ ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½ΠΈΠ΅ состава ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎ-тСхнологичСских Π°ΠΊΡ‚ΠΈΠ²ΠΎΠ² ΠΈ связСй ΠΌΠ΅ΠΆΠ΄Ρƒ Π½ΠΈΠΌΠΈ Π½Π° основС выдСлСния статичных ΠΈ Π΄ΠΈΠ½Π°ΠΌΠΈΡ‡Π½Ρ‹Ρ… ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ² ΠΈΠ·Π½Π°Ρ‡Π°Π»ΡŒΠ½ΠΎ Π½Π΅ΠΎΠΏΡ€Π΅Π΄Π΅Π»Π΅Π½Π½ΠΎΠΉ инфраструктуры являСтся достаточно слоТной Π·Π°Π΄Π°Ρ‡Π΅ΠΉ. Π•Π΅ прСдлагаСтся Ρ€Π΅ΡˆΠΈΡ‚ΡŒ Π·Π° счСт построСния Π°ΠΊΡ‚ΡƒΠ°Π»ΡŒΠ½ΠΎΠΉ динамичСской ΠΌΠΎΠ΄Π΅Π»ΠΈ ΠΎΡ‚Π½ΠΎΡˆΠ΅Π½ΠΈΠΉ ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ² Ρ†Π΅Π»Π΅Π²ΠΎΠΉ инфраструктуры с использованиСм Ρ€Π°Π·Ρ€Π°Π±ΠΎΡ‚Π°Π½Π½ΠΎΠΉ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠΈ, которая Ρ€Π΅Π°Π»ΠΈΠ·ΡƒΠ΅Ρ‚ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ Π½Π° основС коррСляции событий, происходящих Π² систСмС. Разработанная ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠ° основана Π½Π° статистичСском Π°Π½Π°Π»ΠΈΠ·Π΅ эмпиричСских Π΄Π°Π½Π½Ρ‹Ρ… ΠΎ событиях Π² систСмС. ΠœΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠ° позволяСт Π²Ρ‹Π΄Π΅Π»ΠΈΡ‚ΡŒ основныС Ρ‚ΠΈΠΏΡ‹ ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ² инфраструктуры, ΠΈΡ… характСристики ΠΈ ΠΈΠ΅Ρ€Π°Ρ€Ρ…ΠΈΡŽ, ΠΎΡΠ½ΠΎΠ²Π°Π½Π½ΡƒΡŽ Π½Π° частотС использования ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ², ΠΈ, ΠΊΠ°ΠΊ слСдствиС, ΠΎΡ‚Ρ€Π°ΠΆΠ°ΡŽΡ‰ΡƒΡŽ ΠΈΡ… ΠΎΡ‚Π½ΠΎΡΠΈΡ‚Π΅Π»ΡŒΠ½ΡƒΡŽ ΠΊΡ€ΠΈΡ‚ΠΈΡ‡Π½ΠΎΡΡ‚ΡŒ для функционирования систСмы. Для этого Π² Ρ€Π°Π±ΠΎΡ‚Π΅ вводятся ΠΏΠΎΠΊΠ°Π·Π°Ρ‚Π΅Π»ΠΈ, Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ΠΈΠ·ΡƒΡŽΡ‰ΠΈΠ΅ ΠΏΡ€ΠΈΠ½Π°Π΄Π»Π΅ΠΆΠ½ΠΎΡΡ‚ΡŒ свойств ΠΎΠ΄Π½ΠΎΠΌΡƒ Ρ‚ΠΈΠΏΡƒ, совмСстноС использованиС свойств, Π° Ρ‚Π°ΠΊΠΆΠ΅ ΠΏΠΎΠΊΠ°Π·Π°Ρ‚Π΅Π»ΠΈ динамичности, Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ΠΈΠ·ΡƒΡŽΡ‰ΠΈΠ΅ Π²Π°Ρ€ΠΈΠ°Ρ‚ΠΈΠ²Π½ΠΎΡΡ‚ΡŒ свойств ΠΎΡ‚Π½ΠΎΡΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎ Π΄Ρ€ΡƒΠ³ Π΄Ρ€ΡƒΠ³Π°. Π Π΅Π·ΡƒΠ»ΡŒΡ‚ΠΈΡ€ΡƒΡŽΡ‰Π°Ρ модСль ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ΡΡ для ΡΡ€Π°Π²Π½ΠΈΡ‚Π΅Π»ΡŒΠ½ΠΎΠΉ ΠΎΡ†Π΅Π½ΠΊΠΈ уровня критичности Ρ‚ΠΈΠΏΠΎΠ² ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ² систСмы. Π’ Ρ€Π°Π±ΠΎΡ‚Π΅ ΠΎΠΏΠΈΡΡ‹Π²Π°ΡŽΡ‚ΡΡ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΡ‹Π΅ Π²Ρ…ΠΎΠ΄Π½Ρ‹Π΅ Π΄Π°Π½Π½Ρ‹Π΅ ΠΈ ΠΌΠΎΠ΄Π΅Π»ΠΈ, Π° Ρ‚Π°ΠΊΠΆΠ΅ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠ° опрСдСлСния Ρ‚ΠΈΠΏΠΎΠ² ΠΈ сравнСния критичности Π°ΠΊΡ‚ΠΈΠ²ΠΎΠ² систСмы. ΠŸΡ€ΠΈΠ²Π΅Π΄Π΅Π½Ρ‹ экспСримСнты, ΠΏΠΎΠΊΠ°Π·Ρ‹Π²Π°ΡŽΡ‰ΠΈΠ΅ Ρ€Π°Π±ΠΎΡ‚ΠΎΡΠΏΠΎΡΠΎΠ±Π½ΠΎΡΡ‚ΡŒ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠΈ Π½Π° ΠΏΡ€ΠΈΠΌΠ΅Ρ€Π΅ Π°Π½Π°Π»ΠΈΠ·Π° ΠΆΡƒΡ€Π½Π°Π»ΠΎΠ² бСзопасности ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы Windows

    Evaluation of cupcakes bioavailability and nutritional value

    Get PDF
    Numerous studies aimed at expanding the production of domestic healthy food products meet the objectives of national programs and projects implemented at the state level. Flour confectionery products are known to be an integral part of the food basket of our country's inhabitants. Therefore, the use of non-traditional vegetable raw materials with a high content of fiber, vitamins, and minerals in their manufacture is an important research field. In addition, these technologies are resource-saving and allow expanding the range of products for specialized and therapeutic purposes, including those for people with gluten intolerance. However, it should be mentioned that the introduction of additional raw materials is an interference with the traditional cooking technology and may affect the finished product quality, which requires additional research. Therefore, the effect of biologically active components on the bioavailability and nutritional value of a cupcake enriched with non-traditional types of raw materials was studied in the work. The ciliates P. caudatum were used as a test object for assessing the studied samples bioavailability. In addition, indicators of nutritional and energy value were determined in finished products. The studies carried out proved that the use of whole wheat flour, grape seed flour, sesame oil and sesame seeds in the production of cupcakes helps to increase its biotic potential, biological and nutritional value

    Magnetic behaviour of perovskite compositions derived from BiFeO3

    Get PDF
    The phase content and sequence, the crystal structure, and the magnetic properties of perovskite solid solutions of the (1βˆ’y)BiFeO3–yBiZn0.5Ti0.5O3 series (0.05 ≀ y ≀ 0.90) synthesized under high pressure have been studied. Two perovskite phases, namely the rhombohedral R3c and the tetragonal P4mm, which correspond to the structural types of the end members, BiFeO3 and BiZn0.5Ti0.5O3, respectively, were revealed in the as-synthesized samples. The rhombohedral and the tetragonal phases were found to coexist in the compositional range of 0.30 ≀ y ≀ 0.90. Magnetic properties of the BiFe1βˆ’y [Zn0.5Ti0.5]yO3 ceramics with y < 0.30 were measured as a function of temperature. The obtained compositional variations of the normalized unit-cell volume and the NΓ©el temperature of the BiFe1βˆ’y [Zn0.5Ti0.5]yO3 perovskites in the range of their rhombohedral phase were compared with the respective dependences for the BiFe1βˆ’yB 3+yO3 perovskites (where B 3+ = Ga, Co, Mn, Cr, and Sc). The role of the high-pressure synthesis in the formation of the antiferromagnetic states different from the modulated cycloidal one characteristic of the parent BiFeO3 is discussed.publishe

    Antisymmetric exchange in La-substituted BiFe0.5Sc0.5O3 system: symmetry adapted distortion modes approach

    Get PDF
    Neutron powder diffraction measurements on the 35 % La-substituted Bi1-xLaxFe0.5Sc0.5O3-composition revealed that the samples obtained under high-pressure (6 GPa) and high-temperature (1500 K) conditions crystalize into a distorted perovskite structure with the orthorhombic Pnma symmetry and the unit cell para-meters: a(0) = 5.6745(2) angstrom, b(0) = 7.9834(3) angstrom and c(0) = 5.6310(2) angstrom. A long-range magnetic ordering takes place below 220 K and implies a G-type magnetic structure with the moments 4.10(4)mu(B) per Fe aligned predominately along the orthorhombic c-axis. The space group representation theory using the orthorhombic symmetry yields four bi-linear coupling schemes for the magnetic order parameters imposed by antisymmetric exchange interactions. The couplings are analysed based on symmetry adapted distortion modes defined in respect of the undistorted cubic perovskite structure. The approach allows a quantitative estimation of the coupling strength. It is shown that the experimentally found spin configuration combines the magnetic order parameters coupled by the atomic displacement modes with the largest amplitudes. The results indicate that the antisymmetric exchange is the dominant anisotropic term which fully controls the direction of the Fe3+ spins in the distorted perovskite lattice

    Magnetic phenomena in co-containing layered double hydroxides

    Get PDF
    Magnetic behavior of CoII(n)AlIII layered double hydroxides (LDHs) (n=Co/Al=2 and 3) intercalated with nitrate was studied as a function of temperature. Both LDH compounds are paramagnetic above about 8K. A rapid increase of their magnetic moments occurs below this temperature until the moments reach the maximum values at Tmax of 4.0K and 3.2K for Co(2)Al-NO3 and Co(3)Al-NO3, respectively. Below Tmax, the zero-field-cooled and the field-cooled static magnetization curves are strongly different. Along with this low-temperature phenomena, Co(2)Al-NO3 and Co(3)Al-NO3 demonstrate anomalous behavior of their temperature dependence magnetic susceptibility in a highertemperature range: between 75 and 175K, both the paramagnetic Curie temperature and the effective magnetic moment change in a non-monotonous way. Possible structural reasons of the observed magnetic behavior of the CoII(n)AlIII LDHs are discussed.publishe

    High-power ultrasonic synthesis and magnetic-field-assisted arrangement of nanosized crystallites of cobalt-containing layered double hydroxideu

    Get PDF
    High-quality stoichiometric Co2Al–NO3 and Co2Al–CO3 layered double hydroxides (LDHs) have been obtained by precipitation followed by anion exchange, both high-power sonication assisted. Application of high-power ultrasound has been demonstrated to result in a considerable acceleration of the crystallization process and the anion-exchange reaction. Two independent approaches were used to form bulk and 2-D samples of Co2Al–NO3 with the oriented crystallites, namely uniaxial pressing of deposits from sonicated LDH slurries and magnetic field assisted arrangement of LDH crystallites precipitating on glass substrates. A convenient way of preparation of semi-transparent compacts with relatively big blocks of oriented crystallites have been demonstrated. Thin dense transparent films of highly-ordered crystallites of Co2Al–NO3 LDH have been produced and characterized.publishe

    The population history of northeastern Siberia since the Pleistocene.

    Get PDF
    Northeastern Siberia has been inhabited by humans for more than 40,000Β years but its deep population history remains poorly understood. Here we investigate the late Pleistocene population history of northeastern Siberia through analyses of 34 newly recovered ancient genomes that date to between 31,000 and 600Β years ago. We document complex population dynamics during this period, including at least three major migration events: an initial peopling by a previously unknown Palaeolithic population of 'Ancient North Siberians' who are distantly related to early West Eurasian hunter-gatherers; the arrival of East Asian-related peoples, which gave rise to 'Ancient Palaeo-Siberians' who are closely related to contemporary communities from far-northeastern Siberia (such as the Koryaks), as well as Native Americans; and a Holocene migration of other East Asian-related peoples, who we name 'Neo-Siberians', and from whom many contemporary Siberians are descended. Each of these population expansions largely replaced the earlier inhabitants, and ultimately generated the mosaic genetic make-up of contemporary peoples who inhabit a vast area across northern Eurasia and the Americas

    An Analytical Review of the Source Code Models for Exploit Analysis

    Full text link
    Currently, enhancing the efficiency of vulnerability detection and assessment remains relevant. We investigate a new approach for the detection of vulnerabilities that can be used in cyber attacks and assess their severity for further effective responses based on an analysis of exploit source codes and real-time detection of features of their implementation. The key element of this approach is an exploit source code model. In this paper, to specify the model, we systematically analyze existing source code models, approaches to source code analysis in general, and exploits in particular in order to examine their advantages, applications, and challenges. Finally, we provide an initial specification of the proposed source code model

    The testbed for definition of the exploit’s execution features to detect and score cyber attacks

    Full text link
    The paper considers the deployment of the testbed for definition of the exploit’s execution features to detect and score cyber-attacks. The paper describes the place of the proposed testbed in the approach to the cyber-attack detection and scoring. It defines the requirements to the testbed considering the introduced approach. The testbed infrastructure is defined and deployed considering the specified requirements. The introduced testbed infrastructure is justified. Finally, the technique of the testbed implementation for the feature extraction is introduced. The proposed testbed and technique allow combining advantages of the static and dynamic approaches to the exploits analysis and detecting and scoring known and previously unseen cyber-attacks

    Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits

    Full text link
    Currently the problem of monitoring the security of information systems is highly relevant. One of the important security monitoring tasks is to automate the process of determination of the system weaknesses for their further elimination. The paper considers the techniques for analysis of vulnerability indexes and exploit source code, as well as their subsequent classification. The suggested approach uses open security sources and incorporates two techniques, depending on the available security data. The first technique is based on the analysis of publicly available vulnerability indexes of the Common Vulnerability Scoring System for vulnerability classification by weaknesses. The second one complements the first one in case if there are exploits but there are no associated vulnerabilities and therefore the indexes for classification are absent. It is based on the analysis of the exploit source code for the features, i.e. indexes, using graph models. The extracted indexes are further used for weakness determination using the first technique. The paper provides the experiments demonstrating an effectiveness and potential of the developed techniques. The obtained results and the methods for their enhancement are discussed
    corecore