Rychkov V.A.

Rychkov Vadim A.

Senior Lecturer

Department of Financial Monitoring

Head of Department

Отдел обеспечения и учета электронно-цифровых подписей управления информационной безопасности и защиты персональных данных департамента цифрового развития НИЯУ МИФИ
Works at MEPhI since 2020
Work Experience: 4 years

Courses

1. Contemporary approaches to information security
2. Information Security Maintenance Technologies
3. Introduction to the Profession
4. Management (Selected Topics)
5. Modern approaches to project organization
6. Modern problems of management theories
7. Organizational and Legal Support of Information Security
8. Principles of professional work
9. Special Training

Publication activity

1
h-index (Scopus)
2
h-index (РИНЦ)

Showing publications for last 3 years

  1. RSCI Analysis of the effectiveness of modern cybersecurity methods in the financial spheresAnalysis of the effectiveness of modern cybersecurity methods in the financial spheres // 2023 pp. 5-19
  2. RSCI Quantum key distribution in BB-84 protocol. Quantum encryptionQuantum key distribution in BB-84 protocol. Quantum encryption // 2023 pp. 230-236
  3. RSCI Social media marketing in conditions of sanctions, blockages and crisisSocial media marketing in conditions of sanctions, blockages and crisis // 2022 pp. 413-420
  4. RSCI Cyber threats of automated information systems in credit and financial spheresCyber threats of automated information systems in credit and financial spheres // 2022 pp. 361-369
  5. RSCI The relevance of penetration testing for subsequent information securityThe relevance of penetration testing for subsequent information security // 2022 pp. 25-30
  6. RSCI The impact of the COVID-19 pandemic on the economic security of the state, enterprise, and individualThe impact of the COVID-19 pandemic on the economic security of the state, enterprise, and individualThe impact of the COVID-19 pandemic on the economic security of the state, enterprise, and individual // 2022 pp. 63-69
  7. RSCI Analysis of ways to deploy applications with microservices architectureAnalysis of ways to deploy applications with microservices architectureAnalysis of ways to deploy applications with microservices architecture // 2022 pp. 31-38
  8. RSCI Biometric identification in the digital economy in the context of national securityBiometric identification in the digital economy in the context of national securityBiometric identification in the digital economy in the context of national security // 2022 pp. 56-62
  9. Article
    Web of Science & Scopus
    Possibility of Benford’s Law Application for Diagnosing Inaccuracy of Financial Statements // Studies in Computational Intelligence, 2022 Vol. 1032 SCI, Q4 pp. 243-248 doi
  10. RSCI Investigation of a network attack on an information system objectInvestigation of a network attack on an information system objectInvestigation of a network attack on an information system object // 2022 pp. 15-20
  11. RSCI Managing the organization s business processes in an organization as a part of digital transformationManaging the organization s business processes in an organization as a part of digital transformationManaging the organization s business processes in an organization as a part of digital transformation // 2022 pp. 114-120
  12. RSCI Managing the organization s business processes in an organization as a part of digital transformationManaging the organization s business processes in an organization as a part of digital transformationManaging the organization s business processes in an organization as a part of digital transformationManaging the organization s business processes in an organization as a part of digital transformationManaging the organization s business processes in an organization as a part of digital transformationManaging the organization s business processes in an organization as a part of digital transformationManaging the organization s business processes in an organization as a part of digital transformationManaging the organization s business processes in an organization as a part of digital transformation // 2022 pp. 97-105
  13. RSCI Tracking interactions with smart contracts on the Ethereum blockchainTracking interactions with smart contracts on the Ethereum blockchainTracking interactions with smart contracts on the Ethereum blockchainTracking interactions with smart contracts on the Ethereum blockchainTracking interactions with smart contracts on the Ethereum blockchainTracking interactions with smart contracts on the Ethereum blockchainTracking interactions with smart contracts on the Ethereum blockchain // 2022 pp. 45-52
  14. RSCI Detection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowdsDetection of counterfeit and non-counterfeit DDoS attacks and how they differ from flash crowds // 2021 pp. 429-432
  15. RSCI Social engineering in the context of the threat to the economic security of the enterprise // 2021 pp. 719-724
  16. RSCI Methodological basis for SOC // 2021 pp. 334-340
  17. RSCI Using containerization technology for secure software development // 2021 pp. 75-83
  18. RSCI Methods of finding and closing unauthorized access channels on work-stations and servers using various measures and means of information protection // 2021 pp. 143-151

Showing conferences for last 3 years

Conferences not found

The agreement on processing personal data is obtained in accordance with the Federal Law "On Personal Data" from 27/07/2006 N 152-FZ