{"id":1173,"date":"2016-08-25T07:50:41","date_gmt":"2016-08-25T04:50:41","guid":{"rendered":"https:\/\/kaf44.mephi.ru\/?p=1173"},"modified":"2016-08-27T19:08:32","modified_gmt":"2016-08-27T16:08:32","slug":"%d0%bf%d1%8f%d1%82%d1%8c-%d0%b4%d0%be%d0%ba%d0%bb%d0%b0%d0%b4%d0%be%d0%b2-%d0%b2-%d0%b2%d0%b5%d0%bd%d0%b5","status":"publish","type":"post","link":"https:\/\/kaf44.mephi.ru\/?p=1173","title":{"rendered":"\u041f\u044f\u0442\u044c \u0434\u043e\u043a\u043b\u0430\u0434\u043e\u0432 \u0432 \u0412\u0435\u043d\u0435"},"content":{"rendered":"<p>\u0421\u0440\u0430\u0437\u0443 \u043f\u044f\u0442\u044c \u0434\u043e\u043a\u043b\u0430\u0434\u043e\u0432 \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u043e\u0432 \u043a\u0430\u0444\u0435\u0434\u0440\u044b 44 \u0431\u044b\u043b\u0438 \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. \u0438 \u0422\u043e\u043b\u0441\u0442\u044b\u043c \u0410.\u0418. \u043d\u0430 \u0442\u0440\u0435\u0445 \u043c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u044b\u0445 \u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0438\u044f\u0445 \u0432 \u0412\u0435\u043d\u0435 (\u0410\u0432\u0441\u0442\u0440\u0438\u044f) 22-24 \u0430\u0432\u0433\u0443\u0441\u0442\u0430 2016 \u0433.:<\/p>\n<p><span style=\"color: #993366;\">4-\u044f \u043c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u0430\u044f \u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0438\u044f \u00abFuture Internet of Things and Cloud\u00bb (FiCloud 2016)<\/span> \u2013 \u0434\u043e\u043a\u043b\u0430\u0434 \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. \u00abSecurity Operations Centers for Information Security Incident Management\u00bb (\u0426\u0435\u043d\u0442\u0440\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438);<\/p>\n<p><span style=\"color: #993366;\">3-\u0439 \u043c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u044b\u0439 \u0441\u0438\u043c\u043f\u043e\u0437\u0438\u0443\u043c \u00abIntercloud and IoT\u00bb (ICI 2016)<\/span> \u2013 \u0434\u043e\u043a\u043b\u0430\u0434 \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. \u0438 \u0422\u043e\u043b\u0441\u0442\u043e\u0433\u043e \u0410.\u0418. \u00abState-Level Views on Professional Competencies in the Field of IoT and Cloud Information Security\u00bb (\u0412\u0437\u0433\u043b\u044f\u0434\u044b \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u043d\u0430 \u043f\u0440\u043e\u0444\u0435\u0441\u0441\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0435\u0442\u0435\u043d\u0446\u0438\u0438 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 \u0432\u0435\u0449\u0435\u0439 \u0438 \u041e\u0431\u043b\u0430\u043a\u043e\u0432);<\/p>\n<p><span style=\"color: #993366;\">3-\u0439 \u043c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u044b\u0439 \u0441\u0438\u043c\u043f\u043e\u0437\u0438\u0443\u043c \u00abBig Data Research and Innovation\u00bb (BigR&amp;I 2016)<\/span><\/p>\n<p>\u2013 \u0434\u043e\u043a\u043b\u0430\u0434 \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413., \u0422\u043e\u043b\u0441\u0442\u043e\u0433\u043e \u0410.\u0418. \u0438 \u0417\u0430\u043f\u0435\u0447\u043d\u0438\u043a\u043e\u0432\u0430 \u0421.\u0412. \u00abTaxonomy for Unsecure Big Data Processing in Security Operations Centers\u00bb (\u0422\u0430\u043a\u0441\u043e\u043d\u043e\u043c\u0438\u044f \u043d\u0435\u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0431\u043e\u043b\u044c\u0448\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 \u0446\u0435\u043d\u0442\u0440\u0430\u0445 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e);<\/p>\n<p>\u2013 \u0434\u043e\u043a\u043b\u0430\u0434 \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. \u0438 \u041c\u0430\u0445\u043c\u0443\u0434\u043e\u0432\u043e\u0439 \u0410.\u0422. \u00abSurvey of Big Data Information Security\u00bb (\u041e\u0431\u0437\u043e\u0440 \u0432\u043e\u043f\u0440\u043e\u0441\u043e\u0432 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0431\u043e\u043b\u044c\u0448\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445);<\/p>\n<p>\u2013 \u0434\u043e\u043a\u043b\u0430\u0434 \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. \u0438 \u0422\u043e\u043b\u0441\u0442\u043e\u0433\u043e \u0410.\u0418. \u00abApplication of Big Data, Fast Data and Data Lake Concepts to Information Security Issues\u00bb (\u041f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u043f\u043e\u043d\u044f\u0442\u0438\u0439 \u0431\u043e\u043b\u044c\u0448\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u0431\u044b\u0441\u0442\u0440\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u043e\u0437\u0435\u0440 \u0434\u0430\u043d\u043d\u044b\u0445 \u043a \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438).<\/p>\n<p><a href=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3847.jpg\"><img loading=\"lazy\" class=\"size-medium wp-image-1316 alignright\" src=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3847-300x225.jpg\" alt=\"IMG_3847\" width=\"300\" height=\"225\" srcset=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3847-300x225.jpg 300w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3847-768x576.jpg 768w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3847-1024x768.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><a href=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3740.jpg\"><img loading=\"lazy\" class=\"size-medium wp-image-1313 alignleft\" src=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3740-300x225.jpg\" alt=\"IMG_3740\" width=\"300\" height=\"225\" srcset=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3740-300x225.jpg 300w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3740-768x576.jpg 768w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3740-1024x768.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><a href=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3835.jpg\"><img loading=\"lazy\" class=\"size-medium wp-image-1314 alignleft\" src=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3835-300x225.jpg\" alt=\"IMG_3835\" width=\"300\" height=\"225\" srcset=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3835-300x225.jpg 300w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3835-768x576.jpg 768w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3835-1024x768.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><a href=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3844.jpg\"><img loading=\"lazy\" class=\"size-medium wp-image-1315 alignright\" src=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3844-300x225.jpg\" alt=\"IMG_3844\" width=\"300\" height=\"225\" srcset=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3844-300x225.jpg 300w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3844-768x576.jpg 768w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3844-1024x768.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><a href=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3728.jpg\"><img loading=\"lazy\" class=\"size-medium wp-image-1311 alignleft\" src=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3728-300x225.jpg\" alt=\"IMG_3728\" width=\"300\" height=\"225\" srcset=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3728-300x225.jpg 300w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3728-768x576.jpg 768w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3728-1024x768.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a> <a href=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3731.jpg\"><img loading=\"lazy\" class=\"size-medium wp-image-1312 alignright\" src=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3731-300x225.jpg\" alt=\"IMG_3731\" width=\"300\" height=\"225\" srcset=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3731-300x225.jpg 300w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3731-768x576.jpg 768w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3731-1024x768.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a> <a href=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3879.jpg\"><img loading=\"lazy\" class=\"size-medium wp-image-1317 aligncenter\" src=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3879-225x300.jpg\" alt=\"IMG_3879\" width=\"225\" height=\"300\" srcset=\"https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3879-225x300.jpg 225w, https:\/\/kaf44.mephi.ru\/wp-content\/uploads\/2016\/08\/IMG_3879-768x1024.jpg 768w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0421\u0440\u0430\u0437\u0443 \u043f\u044f\u0442\u044c \u0434\u043e\u043a\u043b\u0430\u0434\u043e\u0432 \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u043e\u0432 \u043a\u0430\u0444\u0435\u0434\u0440\u044b 44 \u0431\u044b\u043b\u0438 \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. \u0438 \u0422\u043e\u043b\u0441\u0442\u044b\u043c \u0410.\u0418. \u043d\u0430 \u0442\u0440\u0435\u0445 \u043c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u044b\u0445 \u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0438\u044f\u0445 \u0432 \u0412\u0435\u043d\u0435 (\u0410\u0432\u0441\u0442\u0440\u0438\u044f) 22-24 \u0430\u0432\u0433\u0443\u0441\u0442\u0430 2016 \u0433.: 4-\u044f \u043c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u0430\u044f \u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0438\u044f \u00abFuture Internet of Things and Cloud\u00bb (FiCloud 2016) \u2013 \u0434\u043e\u043a\u043b\u0430\u0434 \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. \u00abSecurity Operations Centers for Information Security Incident Management\u00bb (\u0426\u0435\u043d\u0442\u0440\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 &#8230; <a title=\"\u041f\u044f\u0442\u044c \u0434\u043e\u043a\u043b\u0430\u0434\u043e\u0432 \u0432 \u0412\u0435\u043d\u0435\" class=\"read-more\" href=\"https:\/\/kaf44.mephi.ru\/?p=1173\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts\/1173"}],"collection":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1173"}],"version-history":[{"count":7,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts\/1173\/revisions"}],"predecessor-version":[{"id":1318,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts\/1173\/revisions\/1318"}],"wp:attachment":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}