Durakovskiy A.P.

Durakovskiy Anatoliy P.

Degree: Candidate of Sciences (PhD) in Technology

Associate Professor

Office of Academic Programs: Division of Cybernetic Intelligence Systems (415) / Institute of Cyber Intelligence Systems

Center Director

Certification Test Center of Information Security and Information Security Systems / Institute of Cyber Intelligence Systems
Works at MEPhI since 1983
Work Experience: 14 years

Education

1983 — National Research Nuclear University MEPhI

Courses

1. Academic Practice (Primary Professional Skills)
2. Academic (Research) Practice:
3. Certification Basis for the Technical Instruments of Information Processing
4. Information Object Certification Pursuant to Information Security Requirements
5. Physical Principles of Information Leakage Technical Channels
6. Practical Training (Research Work)
7. Principles of a Facility Certification
8. Principles of Incident Management
9. Principles of Information Security for Critical Objects
10. Principles of Testing Information Security Tools
11. Scientific Research Work
12. Technological Information Security
13. Unauthorized Access Protection Effectiveness Control: Methods and Tools

Publication activity

1
h-index (Scopus)
  1. Article
    MEPhI publication
    To the issue of categorization of critical informational infrastructure objects in higher education // Bezopasnost informacionnyh tehnology, 2019 No. N 2 pp. 44-57 doi
  2. Article
    MEPhI publication
    Use of generator substitution to determine the real attenuation of informative signals in the compromising emanation // Bezopasnost informacionnyh tehnology, 2018 No. N 2 pp. 38-53 doi
  3. Article Use of generator substitution to determine the real attenuation of informative signals in the compromising emanation // IT Security (Russia), NRNU MEPHI, 2018 Vol. 25, No. 2 (2018) pp. 38-53 doi
  4. Article
    Web of Science & Scopus
    Concept for increasing security of national information technology infrastructure and private clouds // Proceedings - 2017 IEEE 5th International Conference on Future Internet of Things and Cloud, FiCloud 2017, 2017 Vol. 2017-January pp. 155-160 doi
  5. Article Concept for increasing security of national information technology infrastructure and private clouds // Proceedings - 2017 IEEE 5th International Conference on Future Internet of Things and Cloud, nstitute of Electrical and Electronics Engineers Inc., 2017 Vol. 2017, No. 2017 pp. 155-160 doi
  6. Article
    MEPhI publication
    About the special investigations of the protection of the technical security systems against information leakage due to the acousto-electrical transformations // Bezopasnost informacionnyh tehnology, 2016 No. N 4 pp. 12-15
  7. Article
    MEPhI publication
    Automated Testing of Information Security Devices, Which Represented as Removable Media, and its Issues // Bezopasnost informacionnyh tehnology, 2016 No. N 1 pp. 28-31
  8. Article
    Web of Science & Scopus
    Cybertrust in e-learning environment based on network time synchronization // CSEDU 2016 - Proceedings of the 8th International Conference on Computer Supported Education, 2016 Vol. 2 pp. 402-407
  9. Article
    Web of Science & Scopus
    Cybertrust in e-Learning Environment based on Network Time Synchronization // PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED EDUCATION, 2016 Vol. VOL, No. CSEDU pp. 402-407 doi
  10. Article
    Web of Science & Scopus
    Cryptographic method of the pictures documenting // Scientific Visualization, 2016 Vol. 8, No. 5, Q4 pp. 13-25
  11. Article
    Web of Science & Scopus
    Russian model of public keys and validation infrastructure as base of the cloud trust // Proceedings - 2016 IEEE 4th International Conference on Future Internet of Things and Cloud, FiCloud 2016, 2016 pp. 123-130 doi
  12. Article
    MEPhI publication
    The Model of System to Counter to Software Tools Learning Code // Bezopasnost informacionnyh tehnology, 2015 No. N 1 pp. 22-24
  13. Article
    MEPhI publication
    About trust in the information systems on the basis of internet-based technologies // Bezopasnost informacionnyh tehnology, 2015 No. N 1 pp. 25-28
  14. Article
    Web of Science & Scopus
    Problem of trust in e-Learning environment // CSEDU 2015 - 7th International Conference on Computer Supported Education, Proceedings, 2015 Vol. 1 pp. 424-429
  15. Article
    Web of Science & Scopus
    Access Control Mechanism Based on Entity Authentication with IPv6 Header 'Flow Label' Field // Proceedings - 2015 International Conference on Future Internet of Things and Cloud, FiCloud 2015 and 2015 International Conference on Open and Big Data, OBD 2015, 2015 pp. 158-164 doi
  16. Article
    MEPhI publication
    Targeted Attacks Using Vulnerability CVE-2013-3897 // Bezopasnost informacionnyh tehnology, 2014 No. N 3 pp. 60-65
  17. Article
    MEPhI publication
    THE USE OF INFORMATION TECHNOLOGIES TO RESOLVE THE ISSUES OF GRADUATE SCHOOL FOREIGN LANGUAGE EDUCATION AT A UNIVERSITY, NOT SPECIALIZING IN FOREIGN LANGUAGE EDUCATION // Bezopasnost informacionnyh tehnology, 2014 No. N 2 pp. 96-100
  18. Article
    MEPhI publication
    ASSURANCE OF AUTHENTIC RESULTS IN TESTING PROCESSES IN THE USE OF DISTANCE LEARNING TECHNOLOGIES // Bezopasnost informacionnyh tehnology, 2014 No. N 1 pp. 57-59

  1. 2019 XI Всероссийская межведомственная научная конференция "Актуальные направления развития систем охраны, специальной связи и информации для нужд органов государственной власти Российской Федерации"
  2. 2019 Fundamental problems of information security in the context of digital transformation (information SECURITY-2019), Stavropol, 1-5 October 2019
  3. 2017 26-TH SCIENTIFIC-TECHNICAL CONFERENCE "METHODS AND TECHNICAL TOOLS OF INFORMATION SECURITY" 26-29 JUNE 2017 Report: Vulnerability analysis of cryptographic authentication mechanisms in the control devices of vehicles

Trainings

Regulatory legal and methodological requirements for the implementation of educational programs in the field of information security in the amount of 72 hours

The agreement on processing personal data is obtained in accordance with the Federal Law "On Personal Data" from 27/07/2006 N 152-FZ