Font size

A
A

Line height

A
A

Color

A
A

Vladimir Vladimirovich Kotenko 

+7(988) 998-35-69

Associate Professor

Institute of Computer Technologies and Information Security

E-mail:
Этот e-mail адрес защищен от спам-ботов, для его просмотра у Вас должен быть включен Javascript Этот e-mail адрес защищен от спам-ботов, для его просмотра у Вас должен быть включен Javascript

Degree: Candidate of Sciences

Personal page in Russian:
https://sfedu.ru/person/kotenkovv
Personal page in English:
https://sfedu.ru/en/person/kotenkovv

Research interests:

The field of scientific interests "Mass communications, means of transmission of information, means of information protection": 1) 38th place in the top 100 most cited Russian scientists from the data RSCI (http://dissertation-info.ru/index. PHP / -100- / 166--100-.html ); 2) 53rd place in the Top 100 most productive Russian scientists from the data RINC (http://dissertation-info.ru/index.php/-100-h/279--100-.html). 3) winner of the All-Russian competition for the best scientific book of 2011 among teachers of higher education institutions and researchers of scientific and research institutions (Kotenko V.V. Theory of virtualization and protection of telecommunications: monograph - 236 s, diploma of the laureate); 4) N-index according to Web science - 7, the number of publications of the author in RSCI - 273 (http://elibrary.ru/author_profile.asp?id=163839), a number of publications in Russian magazines - 215, the number of publications in Russian magazines from the list of VAC - 75

Actual member of the International Academy of Natural Science (N0002969, Germany, Neu-Isenburg).

Federal Expert of the Scientific and Technical Scope of the Russian Federation (certificate of N01-04240 dated July 29, 2019).

Research projects:

1. A comprehensive program to counter the ideology of terrorism in the Republic of Dagestan

2. Organization of professional retraining and training at the workplace of management personnel in Kabardino-Balkaria with the institutions of civil society and nationalities of the CBR.

3. Integration of quantum cryptography technologies and identification analysis into protected information systems.

Publications in the collection "Scientific Development. Research projects 2019-2020 ", published in the South Fe6 Earth University for distribution abroad:

Kotenko, V.V. The development of algorithms, models and methods of information counteraction to threats of terrorism. Scientific developments. Research projects 2019-2020. Principal investigator Vladimir Kotenko Ph.D., Department of Information Security of Telecommunication Systems. ICTIS SFU. – 2019 – P.24.

Kotenko, V.V. Multifactor identification analysis of an individual as a possible carrier or a possible productive target of terrorist threats based on information virtualization parameters of psychophysiological and biometric identifiers. Scientific developments. Research projects 2019-2020. Principal investigator Vladimir Kotenko Ph.D., Department of Information Security of Telecommunication Systems. ICTIS SFU. – 2019 – P.25.

List of Scientific publications: http://elibrary.ru/author_items.asp?authorid=163839

Teaching:

  • Information theory
    Theoretical foundations of information processing. The main concepts and presentations of the theory of information: entropy, mutual information, message sources, communication channels, codes. Quantitative evaluation of information; amount of information; entropy. Mutual information; Mutual information and conditional own information; Middle mutual information and conditional entropy; medium conditional mutual information; Properties of medium mutual information. Representation of information sources. Entropy of discrete sources. Entropy of continuous sources. Redundancy sources of information. Source coding strategies. Coding theorems for sources. The main methods of optimal coding sources of information. Effective codes. Methods for compressing information when encoding sources. Information protection strategies when encoding sources. Theoretical foundations of information transfer. Coding strategy for channels. Scheme and general mathematical model of information transfer. Principles of coding for the channel. General mathematical model of information transmission channels. Submission of codes in the form of polynomials; Groups and subgroups; Fields and polynomials; Methods of building codes. Algorithm Euclida. Representation of codes in the form of matrices. Minimum code distance bandwidth and transmission rate. The influence of interference to the transmission of information. Direct and reverse Chennon coding theorem for channels with noise and no noise. General method of noise-resistant encoding. Basic methods of noise-resistant coding. Opportunities for an information approach to assessing the quality of the functioning of telecommunication systems and information protection. Fundamental theoretical basis of information analysis. Information assessment of the quality of communication. Information evaluation of system protection efficiency. Virtual information approach to optimizing telecommunication processes. Information virtualization of presentation of objects, phenomena and processes. Optimization of information flows
  • Information counteraction threats of terrorism
    Theoretical foundations of information counteraction threats of terrorism. Theoretical foundations of the nature of terrorism. Strategy of theoretical analysis of threats of terrorism. Models of information interaction and protection of intellectual systems in conditions of threats of terrorism. Comprehensive assessment of threats of terrorism. Information modeling of the government system from the standpoint of countering threats of terrorism. Strategy for assessing the effectiveness of information counteraction threats of terrorism. Information modeling of countering threats of terrorism. Organized influence of the information environment on behavioral forms of personality and public groups. Implementation of methods of information counteraction threats of terrorism. Основы противодействия угрозам подсознательной психокоррекции поведенческих форм в массовых информационно-телекоммуникационных процессах. Basics of countering threats of subconscious psychocorrection of behavioral forms in informative interpersonal interaction. Strategies of information struggle in the conditions of threats of terrorism. Information threats. Principles of protection against threats of information impact. Detection and blocking hidden information threats. Systematization of protection against information impact. Information forecast and management of behavioral forms of sources of threats of terrorism. Information approach to assessing the quality of the functioning of telecommunication systems. Administration of information counteraction threats of terrorism
  • Digital communication theory
    Theoretical foundations of transmission and processing of information. Basics of information theory. Quantitative evaluation of information. Information sources. Coding of discrete sources. Effective coding. Encoding continuous sources. Digital information processing strategy when encoding continuous sources. Methods of digital information processing when encoding continuous sources. Protection of information when encoding the source. Theoretical foundations of information transfer. Principles of noise-resistant coding of communication channels. Coding for discrete channels. Basics of the theory of algebraic coding. General characteristics of noise-resistant codes. Methods of noise resistant coding of communication channels. Coding for continuous channels. Information approach to the analysis of digital communication systems. Overall characteristics of digital signal processing tasks. Principles of digital signal processing. Setting the synthesis problem in digital communication. Entropy of the digital view of the signals of analog messages. Informational losses. Quantization of continuous random variables. Noise resistance to digital communication with pulse-code modulation when transmitting a continuous magnitude. Quantization of continuous processes. Nonlinear filtering of analog messages in digital communication systems with pulse-code modulation. Linear filtering of analog messages in digital communication systems with pulse-code modulation. Noise resistance to digital communication with pulse-code modulation when transferring a random process. Digital communication with differential pulse-code modulation. Disability of digital communication with delta modulation. Digital connection with prediction. Digital transmission of speech signals. Vocoder digital telephone connection. Digital transmission of signals of television and trajectory messages. Digital modulation. Information approach to the analysis of protected digital communication.
  • Humanitarian aspects of information protection and information counteraction threats of terrorism
    Theoretical foundations of the nature of terrorism. Strategy of theoretical analysis of threats of terrorism. Models of information interaction and protection of intellectual systems in conditions of threats of terrorism. Comprehensive assessment of threats of terrorism. Information modeling of the government system from the standpoint of countering threats of terrorism. Strategy for assessing the effectiveness of information counteraction threats of terrorism. Information modeling of countering threats of terrorism. Organized influence of the information environment on behavioral forms of personality and public groups. Basics of countering threats of subconscious psychocorrection of behavioral forms in mass information and telecommunication processes. Basics of countering threats of subconscious psychocorrection of behavioral forms in informative interpersonal interaction. Strategies of information struggle in the conditions of threats of terrorism. Information threats. Principles of protection against threats of information impact. Signs of informational defeat. Features of protection against hidden threats. Definition and protection of the target of information impact. Detection and blocking hidden information threats. Systematization of protection against information impact. Information forecast and management of behavioral forms of sources of threats of terrorism. Assessment of the stability of the source of threats of terrorism to a targeted control influence. Information approach to assessing the quality of the functioning of telecommunication systems in conditions of threats of terrorism. Administration of information counteraction threats of terrorism