Abstract
As part of its strategic goals for technological development, the Russian Federation aims to create ultrahigh productivity supercomputer technologies or exascale computing by 2025. To this end, it is necessary to effectively develop domestic production of highly productive and trusted computer aids; to overcome physical limitations relating to energy consumption, reliability, and structural dimension of modern processors; and also to develop and implement effective organization of exascale calculation. Intensive research work is taking place in Russian research and education institutions to solve these scientific and technical problems [1–5].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
Petrenko A. S., Petrenko S. A. Super-productive monitoring centers for security threats. Part 1 // Protection of information. Inside. - 2017. - No. 2. - P. 29-36
- 15.
- 16.
- 17.
- 18.
- 19.
hpc-russia.ru/
- 20.
- 21.
- 22.
- 23.
- 24.
References
Abramov, S.M.: Research in the field of supercomputer technologies of the IPS RAS: a retrospective and perspective. In: Proceedings of the International Conference “Software Systems: Theory and Applications”, vol. 1, pp. 153–192. Publishing house “University of Pereslavl”, Pereslavl (2009)
Guzik, V.F., Kalyaev, I.A., Levin, I.I.: Reconfigurable computing systems; [under the Society. ed. I.A. Kalyayeva], 472 p. Publishing house SFU, Rostov-on-Don (2016)
Kalyaev, I.A., Levin, I.I., Semernikov, E.A., Shmoilov, V.I.: Reconfigurable Multicopy Computing Structures; [under the Society. ed. I. A. Kaliayev]. 2nd edn, 344 p. Pub. House of the Southern Scientific Center RAS, Rostov-on-Don (2009)
Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 1. Protect. Inf. Inside. 2(74), 29–36 (2017)
Petrenko, S.A., Asadullin, A.Y., Petrenko, A.S.: Evolution of the von Neumann architecture. Protect. Inf. Inside. 2(74), 18–28 (2017)
Petrenko, A.S., Petrenko, S.A.: Designing of corporate segment SOPKA. Protect. Inf. Inside. 6(72), 48–50 (2016)
Petrenko, A.S., Petrenko, S.A.: Large data technologies (BigData) in the field of information security. Inf. Protect. Inside. 4(70), 82–88 (2016)
Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 2. Protect. Inf. Inside. 3(75), 48–57 (2017)
Petrenko, S.A., Kurbatov, V.A., Bugaev, I.A., Petrenko, A.S.: Cognitive system of early warning about computer attack. Protect. Inf. Inside. 3(69), 74–82 (2016)
Petrenko, S.A., Petrenko, A.S.: Lecture 12. Perspective tasks of information security. Intelligent information radiophysical systems. Introductory lectures [A. O. Armyakov and others; ed. S.F. Boev, D.D. Stupin, A.A. Kochkarova], pp. 155–166. MSTU them. N.E. Bauman, Moscow (2016)
Abramov, S.M., Lilitko, E.P.: State and prospects of ultra-high performance computing systems development. Inf. Technol. Comput. Syst. 2, 6–22 (2013)
Khomonenko, A.D., Tyrva, A.V., Bubnov, V.P.: Complex of programs for calculation of reliability and planning of software tests. Federal Service for Intellectual Property, Patents and Trademarks: Svid. about the state. reg. software for the computer № 2010615617. Moscow (2010)
Khoroshevsky, V.G.: Architecture of Computing Systems. MSTU Them, 520 p. N.E. Bauman, Moscow (2008)
Kurnosov, M.G.: Models and algorithms for embedding parallel programs in distributed computing systems: Doctoral thesis in Technical. Science, 177 p. Siberian State University of Telecommunications and Informatics, Novosibirsk (2008)
Levin, I.I., Dordopulo, A.I., Kalyaev, I.A., Doronchenko, Y.I., Razkladkin, M.K.: Modern and promising high-performance computing systems with reconfigurable architecture. Proceedings of the international scientific conference “Parallel Computing Technologies (PaVT’2015)”, Ekaterinburg, March 31–April 2, 2015, pp. 188–199. Publishing Center of SUSU, Chelyabinsk (2015)
Action plan. Document WSIS-03/GENEVA/DOC/5-R dated December 12, 2013. Geneva [Electronic resource]. Access mode: http://www.itu.int/dms_pub/itus/md/03/wsis/doc/S03-WSIS-DOC-0005*PDF-R.pdf
Active Engagement, Modern Defence. Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organisation adopted by Heads of State and Government in Lisbon. November 19, 2010 [Electronic resource]. Access mode: http://www.nato.int/cps/en/SID-14EF0623-198FC77E/natolive/official_texts_68580.htm
Advances in the field of information and telecommunications in the context of international security. Report of the UN Secretary-General. Document A/66/152 of 15 July 2011 [Electronic resource]. Access mode: http://www.un.org/en/documents/ods.asp?m=A/66/152
Abramov, S.M.: History of development and implementation of a series of Russian supercomputers with cluster architecture. In: History of Domestic Electronic Computers. 2nd edn, Rev. and additional; color. Ill.: Publishing house “Capital Encyclopedia”, Moscow (2016)
Levin, V.K., et al.: Communication network MVS-express. Inf. Technol. Comput. Syst. 1C, 10–24 (2014)
Wiener, N.: Cybernetics, or Control and Communication in Animal and Machine. 2nd edn, 344 p. Science, Moscow; The main edition of publications for foreign countries (1983)
Ashby, U.R.: Principles of Self-Organization, pp. 314–343. Mir, Moscow (1966)
Bongard, M.M.: The Problem of Recognition. Fizmatgiz, Moscow (1967)
Gavrilova, T.A., Khoroshevsky, V.F.: Bases of Knowledge of Intellectual Systems: A Textbook for High Schools, 384 p. Peter, St. Petersburg (2000)
Redko, V.G.: Evolution, Neural Networks, Intellect. LIBROKOM Book House/URSS, Moscow (2013)
Widrow, B., Stirns, S.: Adaptive Signal Processing. Radio and communication, Moscow (1989)
Petrenko, A.S., Bugaev, I.A., Petrenko, S.A.: Master data management system SOPKA. Inf. Protect. Inside. 5(71), 37–43 (2016)
Petrenko, S.A.: Methods of detecting intrusions and anomalies of the functioning of cyber system, Proceedings of ISA RAS. Risk Manag. Safety. 41, 194–202 (2009)
Petrenko, S.A.: Methods of ensuring the stability of the functioning of cyber systems under conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security, 52, 106–151 (2010)
Petrenko, A.A., Petrenko, S.A.: Cyber units: methodical recommendations of ENISA. Quest. Cybersecurity. 3(11), 2–14 (2015)
Petrenko, A.A., Petrenko, S.A.: Intranet Security Audit (Information Technologies for Engineers), 416 p. DMK Press, Moscow (2002)
Petrenko, A.A., Petrenko, S.A.: Research and Development Agency DARPA in the field of cybersecurity. Quest. Cybersecurity. 4(12), 2–22 (2015)
Petrenko, A.A., Petrenko, S.A.: The way to increase the stability of LTE-network in the conditions of destructive cyber-attacks. Quest. Cybersecurity. 2(10), 36–42 (2015)
Petrenko, A.S., Petrenko, S.A.: The first interstate cyber-training of the CIS countries: “Cyber-Antiterror2016”. Inf. Protect. Inside. 5(71), 57–63 (2016)
Petrenko, S.A.: Methods of Information and Technical Impact on Cyber Systems and Possible Countermeasures. Proceedings of ISA RAS. Risk Manag. Security, 41, 104–146 (2009)
Petrenko, S.A., Petrenko, A.A.: Ontology of cyber-security of self-healing SmartGrid. Protect. Inf. Inside. 2(68), 12–24 (2016)
Petrenko, S.A., Petrenko, A.S.: Creation of a cognitive supercomputer for the computer attacks prevention. Protect Inf. Inside. 3(75), 14–22 (2017)
Petrenko, S.A., Petrenko, A.S.: From detection to prevention: trends and prospects of development of situational centers in the Russian Federation. Intellect Technol. 1(12), 68–71 (2017)
Petrenko, S.A., Petrenko, A.S.: New doctrine as an impulse for the development of domestic information security technologies. Intellect Technol. 2(13), 70–75 (2017)
Petrenko, S.A., Petrenko, A.S.: New doctrine of information security of the Russian Federation. Inf. Protect. Inside. 1(73), 33–39 (2017)
Petrenko, S.A., Petrenko, A.S.: Practice of application of GOST R IEC 61508. Inf. Protect. Insider. 2(68), 42–49 (2016)
Petrenko, S.A., Shamsutdinov, T.I., Petrenko, A.S.: Scientific and technical problems of development of situational centers in the Russian Federation. Inf. Protect. Inside. 6(72), 37–43 (2016)
Petrenko, S.A., Simonov, S.V.: Management of Information Risks. Economically Justified Safety (Information technology for engineers), 384 p. DMK-Press, Moscow (2004)
Petrenko, S.A.: The concept of maintaining the efficiency of cyber system in the context of information and technical impacts. Proceedings of the ISA RAS. Risk Manag. Safety. 41, 175–193 (2009)
Petrenko, S.A.: The Cyber Threat model on innovation analytics DARPA. Trudy SPII RAN. 39, 26–41 (2015)
Petrenko, S.A.: The problem of the stability of the functioning of cyber systems under the conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security. 52, 68–105 (2010)
Petrenko, S.A., Kurbatov, V.A.: Information Security Policies (Information Technologies for Engineers), 400 p. DMK Press, Moscow (2005)
Aristotle. Comp. in 4 volumes (Series “Philosophical heritage”). Thought, Moscow. (1975–1983)
Biryukov, D.N.: Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems. Proc. SPIIRAS. 3(40), 55–76 (2015)
Bocharov, V.A., Markin, V.I.: Fundamentals of Logic. Moscow State University, Moscow (2008)
Chereshkin, D.S.: Problems of Information Security Management, 224 p. Editorial URSS, Moscow (2002)
Grinyaev, S.N.: The battlefield – cyberspace: theory, methods, means, methods and systems of information warfare, 448 p. Harvest, Jordan (2004)
Voevodsky, V.: Voevodsky V. A Very Short Note on the Homotopy Lambda-Calculus (2006)
Rodin, A.V.: Logical and geometric atomism from Leibniz to Voevodsky. Prob. Philos. 6 (2016)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Petrenko, S. (2018). Limitations of Von Neumann Architecture. In: Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation. Springer, Cham. https://doi.org/10.1007/978-3-319-79036-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-79036-7_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-79035-0
Online ISBN: 978-3-319-79036-7
eBook Packages: Computer ScienceComputer Science (R0)