Main Article Content
Scott, Rose (2016), Domain name systems-based electronic mail security, available to:
Quynh, Dang (2012), Recommendation for Applications Using Approved Hash Algorithms, available to: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-107r1.pdf
Schneider, Bruce (2016), Applied cryptography. Protocols, algorithms, source texts in the C language, available to: https://www.labirint.ru/books/345501/
Digital Identity Guidelines (2018), available to: https://doi.org/10.6028/NIST.SP.800-63b
The Cybersecurity Framework (2019), available to: http://csrc.nist.gov/publications/drafts/nistir-8170/nistir8170-draft.pdf.
Guide to LTE Security (2019), available to: csrc.nist.gov/publications/drafts/800-187/sp800_187_draft.pdf
Shapiro, Leonid (2012), Authentication and one-time passwords. Theoretical basis. Part 1, available to: https://elibrary.ru/item.asp?id=20464464
Shapiro, Leonid (2012), Authentication and one-time passwords. Part 2. Implementing OTP for authentication in AD, available to: https://elibrary.ru/item.asp?id=20464277
SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash and ParallelHash (2019), available to:
Evseev, S.P. and Abdullaev, V.G. (2015), “Algorithm for Monitoring the Two-Factor Authentication Method Based on the Passwindow System”, East European Journal of Advanced Technologies, Issue. 2/2 (74), pp. 9–15.
Evseev, S.P., Abdullaev, Zh., Agazade, F. and Abbasova V.S. (2016), “Improvement of the method of two-factor authentication based on the use of modified crypto-code schemes”, System of information boxes, No. 9 (146), pp. 132–145.
Evseev, S.P., Kots, G.P. and Lekarev E.V. (2016), “Development of the method of multifactor authentication based on the modified Niedereiter-McEliece crypto-code systems”, East-European Journal of Advanced Technologies, 6/4 (84), pp. 11–23.
Robert, Hackett (2016), You’re implementing this basic security feature all wrong, available to:
Guide for Cybersecurity Event Recovery (2019), available to:
Security requirements for cryptographic modules (2019), available to:
Annex A: Approved Security Functions for FIPS PUB 140-2 (2019),
available to: csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf
Annex B: Approved Protection Profiles for FIPS PUB 140-2 (2019), available to:
Annex C: Approved Random Number Generators for FIPS PUB 140-2 (2019),
Evseev, S.P., Rzaev, Kh.N. and Korol, O.G. (2016), “Development of the modified asymmetric crypto-code system of McEliece on truncated elliptic codes”, East European Journal of Advanced Technologies, Kharkiv, Is. 4/9 (82), pp. 4–12.
Mishchenko, V. A. and Vilansky, Yu. V. (2007), Damage texts and multichannel cryptography, Encyclopedic, Minsk, 292 p.
Mishchenko, V. A. ,Vilansky, Yu. V. and Lepin, V.V. (2006), The cryptographic algorithm MV 2, Minsk, 177 p.
Shannon, K.E. (1963), “The theory of communication in secret systems”, Work on the theory of information and cybernetics, Moscow, pp. 333–402.
Hryshchuk, R., Yevseiev, S. and Shmatko, A. (2018), Construction methodology of information security system of banking information in automated banking systems, monograph, Premier Publishing s. r. o., Vienna, 284 p.
Schwartz, M. J. (2011), “Zeus Banking Trojan Hits Android Phones”, Information week, available:
Trojan Writers Target UK Banks with Botnets (2010), TechWorld, available to: http://news.techworld.com/security/3228941/trojan-writers-target-uk-banks-with-botnets
Grishchuk R., Danik Yu. (2016), Fundamentals of cyber security, Zhitomir: ZHNAEU, 228 р.
Kiberbezopasnost 2016–2017: Otitogov k prognozam (2017), available to:
Rise of IoT Botnets Showcases Cybercriminals’ Ability to Find New Avenues of Attack (2019), available to:
HP research: average annual damage from cyber attacks increased up to 15 million USD for organization (2015), available to: http://www.connect-wit.ru/issledovanie-hp-crednij-godovoj-ushherb-ot-kiberatak-vyros-do-15-mln-doll-na-organizatsiyu.html
Data Bank of Information Security Threats (2019), available to: http://bdu.fstec.ru/vul
Guide for Cybersecurity Event Recovery (2019), available: https://nvlpubs.nist.gov/nistpubs/.../NIST.SP.800-184.pdf
Guide to LTE Security, [Online]. Available: https://csrc.nist.gov/publications/drafts/800-187/sp800_187_draft.pdf