{"id":2004,"date":"2018-11-30T06:40:46","date_gmt":"2018-11-30T03:40:46","guid":{"rendered":"https:\/\/kaf44.mephi.ru\/?p=2004"},"modified":"2018-12-22T06:42:36","modified_gmt":"2018-12-22T03:42:36","slug":"%d1%81%d1%82%d0%b0%d1%82%d1%8c%d1%8f-%d0%be-blockchain-based-siem-3-0","status":"publish","type":"post","link":"https:\/\/kaf44.mephi.ru\/?p=2004","title":{"rendered":"\u0421\u0442\u0430\u0442\u044c\u044f \u043e Blockchain-based SIEM 3.0"},"content":{"rendered":"<p>\u0412 \u0436\u0443\u0440\u043d\u0430\u043b\u0435 \u201cInformation and Computer Security\u201d (2018, \u0442\u043e\u043c 26, \u0432\u044b\u043f\u0443\u0441\u043a 4, \u0441\u0442\u0440.\u00a0491-512) \u0438\u0437\u0434\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 Emerald Publishing (\u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u044f) \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430 \u0441\u0442\u0430\u0442\u044c\u044f \u0434\u043e\u0446\u0435\u043d\u0442\u0430 \u043a\u0430\u0444\u0435\u0434\u0440\u044b 44 \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c \u201c Designing Blockchain-based SIEM 3.0 System\u201d (<a href=\"https:\/\/www.emeraldinsight.com\/doi\/abs\/10.1108\/ICS-10-2017-0075\">https:\/\/www.emeraldinsight.com\/doi\/abs\/10.1108\/ICS-10-2017-0075<\/a>). \u0421\u0442\u0430\u0442\u044c\u044f \u0443\u0436\u0435 \u043f\u0440\u043e\u0438\u043d\u0434\u0435\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0432 \u0431\u0430\u0437\u0430 <em>Scopus \u0438 WebofKnowledge<\/em>, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0432 \u043d\u0435\u0439 \u043f\u0440\u0435\u0434\u043b\u043e\u0436\u0435\u043d \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u043d\u043e \u043d\u043e\u0432\u044b\u0439 \u043f\u043e\u0434\u0445\u043e\u0434 \u043a \u043f\u043e\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u044e \u0441\u0438\u0441\u0442\u0435\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0435\u0439 \u0438 \u0441\u043e\u0431\u044b\u0442\u0438\u044f\u043c\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439, \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0438 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439 \u0431\u043b\u043e\u043a\u0447\u0435\u0439\u043d\u0430.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0412 \u0436\u0443\u0440\u043d\u0430\u043b\u0435 \u201cInformation and Computer Security\u201d (2018, \u0442\u043e\u043c 26, \u0432\u044b\u043f\u0443\u0441\u043a 4, \u0441\u0442\u0440.\u00a0491-512) \u0438\u0437\u0434\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 Emerald Publishing (\u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u044f) \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430 \u0441\u0442\u0430\u0442\u044c\u044f \u0434\u043e\u0446\u0435\u043d\u0442\u0430 \u043a\u0430\u0444\u0435\u0434\u0440\u044b 44 \u041c\u0438\u043b\u043e\u0441\u043b\u0430\u0432\u0441\u043a\u043e\u0439 \u041d.\u0413. \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c \u201c Designing Blockchain-based SIEM 3.0 System\u201d (https:\/\/www.emeraldinsight.com\/doi\/abs\/10.1108\/ICS-10-2017-0075). \u0421\u0442\u0430\u0442\u044c\u044f \u0443\u0436\u0435 \u043f\u0440\u043e\u0438\u043d\u0434\u0435\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0432 \u0431\u0430\u0437\u0430 Scopus \u0438 WebofKnowledge, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0432 \u043d\u0435\u0439 \u043f\u0440\u0435\u0434\u043b\u043e\u0436\u0435\u043d \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u043d\u043e \u043d\u043e\u0432\u044b\u0439 \u043f\u043e\u0434\u0445\u043e\u0434 \u043a \u043f\u043e\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u044e \u0441\u0438\u0441\u0442\u0435\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0435\u0439 \u0438 \u0441\u043e\u0431\u044b\u0442\u0438\u044f\u043c\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 &#8230; <a title=\"\u0421\u0442\u0430\u0442\u044c\u044f \u043e Blockchain-based SIEM 3.0\" class=\"read-more\" href=\"https:\/\/kaf44.mephi.ru\/?p=2004\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts\/2004"}],"collection":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2004"}],"version-history":[{"count":2,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts\/2004\/revisions"}],"predecessor-version":[{"id":2006,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=\/wp\/v2\/posts\/2004\/revisions\/2006"}],"wp:attachment":[{"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kaf44.mephi.ru\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}