Igor Zikratov

Igor Zikratov
ITMO University | SPbNRU ITMO · Department of Secure Information Technology

About

21
Publications
5,871
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
211
Citations

Publications

Publications (21)
Article
Subject of research. The research is focused on optimization management tasks of the ground unmanned vehicles in difficult conditions. We showed that it is possible to minimize passage time of road sections with narrowing and maintain security requirements in case of the centralized management. Method. A method of the unmanned cars movement is base...
Conference Paper
Full-text available
In this paper, we consider the verification of the hypothesis in the research of computer incidents study, based on the analysis of attributes and their values with post-incident computer equipment. The essence of the hypothesis constitutes the ability to study computer incidents in the types of computer memory; analyzing only the attributes and th...
Article
In this paper, we propose a traffic management system with agents acting on behalf autonomous vehicle at the crossroads. Alternatively to existing solutions based on usage of semiautonomous control systems with the control unit, proposed in this paper algorithm apply the principles of decentralized multi-agent control. Agents during their collabora...
Conference Paper
Full-text available
A lot of research attention has recently been dedicated to multi-agent systems, such as autonomous robots that demonstrate proactive and dynamic problem-solving behavior. Over the recent decades, there has been enormous development in various agent technologies, which enabled efficient provisioning of useful and convenient services across a multitu...
Article
Full-text available
Graph-based post incident internal audit method of computer equipment is proposed. The essence of the proposed solution consists in the establishing of relationships among hard disk damps (image), RAM and network. This method is intended for description of information security incident properties during the internal post incident audit of computer...
Conference Paper
Full-text available
In this work, we emphasize the practical importance of mission-critical wireless sensor networks (WSNs) for structural health monitoring of industrial constructions. Due to its isolated and ad hoc nature, this type of WSN deployments is susceptible to a variety of malicious attacks that may disrupt the underlying crucial systems. Along these lines,...
Conference Paper
Full-text available
The wireless self-organizing network under attack was considered. The aim was to organize “a broadcast storm” in order to determine the availability of individual units, and the ability to carry out their functional tasks in an information exposure. A number of conditions for the organization of this type of attack by a potential intruder informati...
Conference Paper
Full-text available
When performing the internal audit of computer equipment an important problem is to identify the elf (executable and linkable format) files stored on the investigated hard drive. To solve this problem, we propose a method of identification of unknown elf-ffles based on the metric classification algorithms. The method consists of three stages. On th...
Conference Paper
In this paper we analyze the functioning of multi-agent robotic systems with decentralized control in conditions of destructive information influences from robots-saboteurs. We considered a type of hidden attacks using interception of messages, formation and transmission of misinformation to a group of robots, and also realizing other actions which...
Article
A representation is obtained for the effective scattering surface of an angle reflector of large electric size with impedance facets. The two-facet angle reflector is formed by two plane plates with a common rib what leads to origin of diffraction fields with different origin mechanisms. The method suggested has small calculation expenditure and hi...

Network

Cited By