The purpose of the article is to review the criteria that affect the functionality of the platform to deceive attackers, to identify the strengths and weaknesses of the technology, to consider current trends and areas for further research. The method of study is analysis of existing articles in peer-reviewed Russian and foreign sources, aggregation of research, and formation of conclusions based on the analyzed sources. The article discusses basic and situational metrics to consider when selecting and evaluating a trap - cost of implementation, design complexity, risk of compromise, data collected, strength of deception, available connections, false positive rate, attack attribution, attack complexity, time to compromise, diversity of interactions, early warning, effectiveness of attack repellency, impact on attacker behavior, threats detected by the trap, resilience. A breakdown of the strengths and weaknesses of Deception technology, which are worth paying attention to when using it. Deception platform development trends are reviewed, as well as areas of research in which the platform is under-researched.
Keywords: false target infrastructure, deception platform, honeypot, honeytoken, honeynet
The article is devoted to the design of local treatment facilities in the city of Borovsk, Kaluga Region. Treatment facilities play an important role in the modern world. They are necessary for processing wastewater so that it becomes safe for the environment and can be discharged into water bodies or drainage networks. Since the discharge of untreated water can cause irreparable harm to the ecosystem, it is important to provide treatment facilities in the sewerage system of the settlement. The article considers the tasks and importance of treatment systems, their role in the life of modern cities, and also presents in detail the step-by-step organization of work on the device of local treatment systems and their subsequent commissioning
Keywords: wastewater treatment plants, ecosystem, water disposal, wastewater, modular structures
The article examines the Lepeshinsky House in Nalchik as a significant architectural and cultural heritage site. It describes the historical aspects of its construction in the late 19th century, architectural features and artistic elements that make the building unique. The authors emphasize the importance of preserving this monument for future generations and its role in shaping the cultural identity of the region. The article also discusses current problems of the building’s operation and plans for its restoration aimed at restoring its historical appearance and preventing further destruction. Key aspects include the need to protect cultural heritage and draw public attention to the significance of such objects for the history and culture of the people.
Keywords: Lepeshinsky House, Nalchik, architectural heritage, cultural heritage, historical building, restoration, preservation, architectural features, mansion, Kabardino-Balkarian Republic
In territorial planning, the choice of industrial territories is crucial for the state. The advantageous location will allow for the creation of labor application points to ensure stable economic growth. Understanding and taking into account the parameters of the formation and further functioning of such territories always require an integrated approach, that is, taking into account both economic and social, spatial and environmental factors. When planning, the accessibility of transport infrastructure, the availability of raw materials, tax incentives and other economic incentives can be key when choosing a particular area for the location of industrial facilities on it. An integrated approach can become especially relevant not only when planning new undeveloped territories, but also when converting existing large production areas.
Keywords: socio-economic development, comprehensive assessment, factors of the urban planning system, industrial park, industrial zone
This article is devoted to a comparative analysis of the resilience of ResNet18 and ResNet50 neural networks to adversarial attacks on training sets. The issue of the importance of ensuring the safety of learning sets is considered, taking into account the growing scope of artificial intelligence applications. The process of conducting an adversarial attack is described using the example of an animal recognition task. The results of two experiments are analyzed. The purpose of the first experiment was to identify the dependence of the number of epochs required for the successful execution of an adversarial attack on the training set on the neural network version of the ResNet architecture using the example of ResNet18 and ResNet50. The purpose of the second experiment was to get an answer to the question: how successful are attacks on one neural network using modified images of the second neural network. An analysis of the experimental results showed that ResNet50 is more resistant to competitive attacks, but further improvement is still necessary.
Keywords: artificial intelligence, computer vision, Reset, ResNet18, ResNet50, adversarial attacks, learning set, learning set security, neural networks, comparative analysis
This paper addresses the limited accuracy of existing automatic systems for detecting deepfake audio content in real time. A solution is proposed to increase the efficiency of detecting signs of deepfake use by improving neural network models and algorithms for analyzing audio recordings of human voices. An algorithm and corresponding software for a voice attack detection system have been developed. For training and testing, datasets were created containing real voice audio recordings and deepfake audio samples. Evaluation on a real-world test set demonstrated an accuracy rate of 83%, confirming the effectiveness and practical applicability of the proposed solution in combating audio deepfake threats.
Keywords: deepfake, speech audio signal, machine learning models, convolutional neural network, vishing
The article explores the actor model as implemented in the Elixir programming language, which builds upon the principles of the Erlang language. The actor model is an approach to parallel programming where independent entities, called actors, communicate with each other through asynchronous messages. The article details the main concepts of Elixir, such as comparison with a sample, data immutability, types and collections, and mechanisms for working with the actors. Special attention is paid to the practical aspects of creating and managing actors, their interaction and maintenance. This article will be valuable for researchers and developers interested in parallel programming and functional programming languages.
Keywords: actor model, elixir, parallel programming, pattern matching, data immutability, processes, messages, mailbox, state, recursion, asynchrony, distributed systems, functional programming, fault tolerance, scalability
The paper proposes a method for calculating the area of a flat area from a photograph based on the use of mathematical analysis methods. To calculate the area, a curved integral of the second kind is used along a closed contour bounding the area under consideration. Defining the boundary in the form of a Bezier spline reduces the calculation of a curved integral to the calculation of several definite integrals from the Bernstein basis polynomials. An explicit form is obtained for integrals of Bernstein basis polynomials. For a third-order Bezier spline, a formula is derived for calculating the area of the area in terms of the coordinates of the reference points of the Bezier curves.
Keywords: cubic spline, Bernstein basis polynomials. Bezier curve, Bezier spline, Green's formula, beta function, gamma function
Digital twin technology shows significant potential in transforming various industries by enabling the modeling, analysis, and optimization of complex systems in real time. The integration of digital twin with the Industrial Internet of Things has opened up new opportunities for innovation and efficiency. In this regard, this article describes the methods and technologies that can be used to develop digital twins in Industrial Internet of Things applications and systems. Special attention is paid to such methods as: multiphysics and multiscale modeling, system life cycle method, data-driven modeling. Some technologies and architectures that can be used at three levels of creating a digital twin for Industrial Internet of Things systems are also described.
Keywords: digital twin, model, system, data, architecture, Industrial Internet of Things, communication, network, analysis, sensors
The ancient fortress located on the territory of the prince's estate of Zabota, on the left bank of the Chegema River, currently located between Lechinkai and Chegem II, is the subject of this article. The article examines the unique Kabardian stone structures, analyzes their distinctive characteristics and compares them with typical stone buildings of the late Middle Ages in Kabardino-Balkaria. In addition, the article examines how the culture and traditions of the region influenced the design of stone products, as evidenced by the architectural solutions used in the construction. The research conducted in this article focuses on the study of archaeological finds in order to reconstruct the history of a particular region and track socio-cultural changes that have occurred over a long period of time. The scientific basis of this study is based on materials collected in museums and bibliographic research.
Keywords: architecture, fortress, hillforts, fortifications, settlements, residence, fortification, stone structure, North Caucasus, Kabarda
This article is devoted to the issues of implementation of automated control system of regional electric networks based on intelligent technologies. The significance of the issue under consideration is expressed in the fact that along with the development of technologies and their active use, electric loads in networks where large losses of electric power occur are increasing. Some issues of increasing the efficiency of production and consumption of energy resources at the regional level are considered. The main elements of the system approach to the analysis of the automated process control system of the regional energy system (APCS RES) are described. An example of the design and implementation of a pilot project for the introduction of intelligent technologies in the electrical networks of the Chechen Republic, in particular in the electrical networks of the city of Argun, is given. The most significant entities of the regional electric power industry are considered, which determine the process of functioning of the automated process control system of the power grid, as well as those that have or are capable of having an impact on the structure and process of functioning of the automated process control system of the power grid, where the degree of influence, situations and moments of influence for all the entities given are absolutely different. The conducted methodology of forming entities represents their dependence on each other to varying degrees.
Keywords: electricity metering, electrical network, intelligent technologies, automated process control system, regional energy system, electricity tariff
The article examines the specifics of the operation of Russian and European tower cranes. With the development of technology, tower cranes are becoming more and more advanced, equipped with modern automation systems. The lack of understanding of the differences in the operation of tower cranes from different manufacturers and the potential problems associated with this remain unresolved and require study. In this regard, conducting a detailed analysis of the features and differences in the operation of this special equipment will avoid problems in the construction industry, as well as reduce the risk of accidents. As part of the study, a comparison of the characteristics and performance of individual Russian and European tower cranes was conducted, on the basis of which the advantages and disadvantages of this type of equipment were identified. In the course of the work, recommendations were proposed to improve the operation of Russian tower cranes, which will contribute to the creation of more competitive equipment on the Russian market.
Keywords: tower crane, tower crane design, operation, specifics of European and Russian tower cranes, automation system
The purpose of the article is to review various types how to deceive attackers in the network, analyze the applicability and variability of modern deception technologies. The method of investigation - analyzing existing articles in reviewed Russian and foreign sources, aggregating researches, forming conclusions based on the analyzed sources. The review article considers technologies of deception an attacker (Honeypot traps, Honeytoken decoys, moving target defense MTD, Deception platform). The effectiveness of the use of deception in terms of the impact on the mental state of a person is given in the article. The article provides a description of different types of Honeypots, discusses the classification according to the target, place of introduction, level of interaction, location, type of introduction, homogeneity and type of activity. as well as their component parts. Different strategies for using traps in the network are discussed - sacrificial lamb, hacker zoo, minefield, proximity traps, redirection screens, and deception ports. Classification of decoys is given, methods of their application in an organization's network are described, additional conditions that increase the probability of detection of an attacker by using decoys are specified. The basic techniques of the MTD strategy to obfuscate the infrastructure are given. The interaction of these methods with Honeypot and Honeytoken technologies is described. Research that confirms the effectiveness of using MTD in conjunction with traps and decoys is given it he article, the difficulties in using this strategy are pointed out. A description of the Deception platform is given, its distinctive features from conventional traps and decoys are described, and the possibility of its interaction with MTD is given. As a result, the main technologies and strategies to deceive the attacker have been identified and described, their development is pointed, their interaction with attackers and counteraction to them is described.
Keywords: Deception Platform, Honeypot, Honeytoken, Honeynet, MTD
A transient non-linear coupled heat transfer problem with heat conductivity properties being dependent on moisture content has been studied for heterogeneous domain represented by a building exterior structure. Moisture content is considered as a variable parameter linked to material permeability and vapour transfer characteristics as well as amount of moist being condensed and evaporated. The solution to such problem has been obtained by using semi-analytical approach where the governing equations have been discretized by using finite element technique at the spatial domain, and analytically at temporal domain. Picard iteration method has been used for equation linearization. Based on a connection detail of three-layered exterior wall with floor slab, a sample problem has been solved. The results are compared with the results of similar but linear problem.
Keywords: non-linear transient problem, semi-analytical method, heat transfer, evaporation, condensation
The article proposes a set of anthropomorphic models for assessing the risks of infrastructural destructivism effects. These models are based on one of the approaches to assessing the risks of infrastructural genesis, which consists in assessing the effect of infra-structural destructivism, consisting in the uncontrolled self-destruction of the information infrastructure. In contrast to existing approaches to assessing the indicators of infrastructural destructivism, the article proposes the use of models that take into ac-count multiple inter-object behavioral interactions of processes based on the anthropomorphic approach. The anthropomorphic approach involves the implementation of algorithms for assessing inter-object interactions according to the principles of development of wildlife. The phenomenon of infrastructural destructivism has a practical explanation associated with the fact that under certain conditions, the simultaneous implementation of destructive impacts on infrastructure objects from various sources can lead to both catastrophic changes (that is, to the complete self-destruction of the information infrastructure) and to minimizing the risks of infrastructural genesis. The article introduces the concept of the "health" metric in the infrastructure information security monitoring system, which displays the presence of "negative" behavioral activities of processes and thereby predicts an increase in the probability of the appearance of infra-structure destructiveness effects. Thus, when applying the proposed models, it becomes possible to increase the accuracy of assessing the risks of infrastructure genesis, and therefore ensure a sufficient level of information security.
Keywords: infrastructure destructiveness, destructive impacts of infrastructure genesis, anthropo-morphic approach, intelligent analysis of event logs, behavioral analysis