Skip to main content
Log in

Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and striving for brinkmanship, and ensuring sufficient security with minimal effort for customers and consumers while not impairing—and in some cases improving—the privacy of their infrastructure and the Internet of Things (IoT) security maturity model (SMM). The benefits of the latter strategy are estimated by selecting an architecture with the core of the IoT SMM in the form of a hierarchy of security practices. Algorithms ensuring privacy and protection from threats are analyzed. A methodology for analyzing and selecting the best architecture for multicore hierarchical clustering of computer systems is proposed. An expert system based on the on-chip MCNPAoC SBIS 1879BM8Y instrument module MS 127.05 with the proposed user interface is implemented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.

REFERENCES

  1. Rudina, E. and Goncharov, U., Maturity model of security of the Internet of Things: A boon for the development of secure systems of AO Laboratoriya Kasperskogo, 2019.

  2. Jozwiak, L., Introduction to modern cyber-physical systems and their quality-driven design, Proc. 8th Mediterranean Conf. on Embedded Computing, CPS & IoT, MECO’2019, Budva, Montenegro, 2019, pp. 3–65.

  3. Horst, F., A survey of problems in authenticated communication and control, MIT Lincoln Laboratory, 1958.

    Google Scholar 

  4. Chernikov, A., Chernikov, V., Vixne, P., and Shelukhin, A., New core of signal processor core NMC4 of set neuro matrix, Proc. 6th Moscow Supercomputing Forum, 2015, pp. 12–13.

  5. Ruchkin, V., Fulin, V., Romanchuk, V., Koryachko, A., and Ruchkina, E., Personal trusted platform module for the multi-core system of 5G security and privacy, 2020 ELEKTRO, Taormina, Italy, 2020, IEEE, 2020, pp. 1–4.  https://doi.org/10.1109/ELEKTRO49696.2020.9130294

  6. Ruchkin, V.N., Kostrov, B.V., and Svirina, A.G., Sistemy iskusstvennogo intellekta. Neiroseti i neirokomp’yutery. Uchebnik (Artificial Intelligence Systems: Neural Networks and Neurocomputers: Textbook), Moscow: Kurs, 2018.

  7. Ruchkin, G., Soldatov, V., Fulin, B., Kostrov, E., and Ruchkina, E., Macros for coding information encryption & decryption in trusted platform module, 2020 Int. Multi-Conf. on Industrial Engineering and Modern Technologies (FarEastCon), Vladivostok, 2020, IEEE, 2020, pp. 1–5.  https://doi.org/10.1109/FarEastCon50210.2020.9271523

  8. Zlobin, V.K. and Ruchkin, V.N., Neiroseti I neirokomp’yutery. Uchebnoe posobie (Neural Networks and Neurocomputers), St. Petersburg: BKhV-Peterburg, 2011.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. N. Ruchkin.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by O. Pismenov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ruchkin, V.N., Kostrov, B.V. & Fulin, V.A. Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture. Aut. Control Comp. Sci. 56, 970–980 (2022). https://doi.org/10.3103/S014641162208020X

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S014641162208020X

Keywords:

Navigation