Персона: Плаксий, Кирилл Валерьевич
Загружается...
Email Address
Birth Date
Научные группы
Организационные подразделения
Организационная единица
Институт интеллектуальных кибернетических систем
Цель ИИКС и стратегия развития - это подготовка кадров, способных противостоять современным угрозам и вызовам, обладающих знаниями и компетенциями в области кибернетики, информационной и финансовой безопасности для решения задач разработки базового программного обеспечения, повышения защищенности критически важных информационных систем и противодействия отмыванию денег, полученных преступным путем, и финансированию терроризма.
Статус
Фамилия
Плаксий
Имя
Кирилл Валерьевич
Имя
5 results
Результаты поиска
Теперь показываю 1 - 5 из 5
- ПубликацияТолько метаданныеStandardization issues for the internet of things(2019) Miloslavskaya, N.; Nikiforov, A.; Plaksiy, K.; Tolstoy, A.; Милославская, Наталья Георгиевна; Никифоров, Андрей Александрович; Плаксий, Кирилл Валерьевич; Толстой, Александр Иванович© Springer Nature Switzerland AG 2019. The development of the Internet of Things (IoT) entails the emergence of new security threats and risks. The daily promotion of using more devices in more areas of life requires the development of new security standards. Interactions with and within the IoT have to be regulated by the documents of leading international organizations. At the same time, the problems of ensuring IoT security are not yet fully worked out because of the constantly expanding methods, tools, and devices involved in these processes. The paper discusses existing standards in the field of IoT’s information security (IS). This research is focused on how the IS issues are addressed in these standards. An assumption on the significance and prospects of the progress in this field is made on the basis of the analysis performed.
- ПубликацияТолько метаданныеApplying graph theory to detect cases of money laundering and terrorism financing(2019) Miloslavskaya, N. G.; Nikiforov, A.; Plaksiy, K.; Tolstoy, A.; Милославская, Наталья Георгиевна; Никифоров, Андрей Александрович; Плаксий, Кирилл Валерьевич; Толстой, Александр Иванович© 2020, IGI Global.A technique to automate the generation of criminal cases for money laundering and financing of terrorism (ML/FT) based on typologies is proposed. That will help an automated system from making a decision about the exact coincidence when comparing the case objects and their links with those in the typologies. Several types of subgraph changes (mutations) are examined. The main goal to apply these mutations is to consider other possible ML/FT variants that do not correspond explicitly to the typologies but have a similar scenario. Visualization methods like the graph theory are used to order perception of data and to reduce its volumes. This work also uses the foundations of information and financial security. The research demonstrates possibilities of applying the graph theory and big data tools in investigating information security incidents. A program has been written to verify the technique proposed. It was tested on case graphs built on the typologies under consideration.
- ПубликацияТолько метаданныеBlock Formation for Storing Data on Information Security Incidents for Digital Investigations(2021) Miloslavskaya, N.; Nikiforov, A.; Plaksiy, K.; Милославская, Наталья Георгиевна; Никифоров, Андрей Александрович; Плаксий, Кирилл Валерьевич© 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.Nowadays technologies such as Blockchain (BC) and the Internet of Things (IoT) can be heard everywhere. But because of the leap in the development of these technologies, there is a need to evaluate the existing approaches critically. One of the up-to-date tasks is to study information security (IS) incidents as a part of the IoT. Due to a large number of different manufacturers and options for technology implementation, it cannot be unambiguously concluded what choice will be better. The paper examines the related work in the area and proposes an approach to form the basis for storing data on IS incidents. For this purpose, the authors formulate a block structure for including in a chain for later use, for example, in computer forensics.
- ПубликацияТолько метаданныеBig Data Analytics for Financial Crime Typologies(2019) Plaksiy, K.; Nikiforov, A.; Miloslavskaya, N.; Плаксий, Кирилл Валерьевич; Никифоров, Андрей Александрович; Милославская, Наталья Георгиевна© 2019, Springer Nature Switzerland AG.The paper proposes a technique to automate the generation of new criminal cases for money laundering from crime and financing terrorism (ML/FT), which are based on ML/FT typologies. At the same time, the paper is focused not on the existing methods, but offer its own implemented on the basis of creating various versions of case typologies and further filtering them by the derived criteria. For this purpose, it is supposed to use Big Data tools. The successful application of the developed technique is shown on examples of the commission and VAT carousel schemes. To implement and verify this technique a program was written that successfully passed the test on case graphs built on ML/FT typologies.
- ПубликацияТолько метаданныеThe Use of Virtual Reality Technologies in the Specialists' Training in the Field of Information Security(2022) Chekhovskoy, Y.; Plaksiy, K.; Nikiforov, A.; Miloslavskaya, N.; Плаксий, Кирилл Валерьевич; Никифоров, Андрей Александрович; Милославская, Наталья Георгиевна