Search

Issue
Title
Authors
BASES OF INFORMATION SECURITY IN DEVELOPING SITES
Yuldashev T.Z., Sheptunov S.A.
Enterprise Data Processing Networks: Authentication and Identifcation Procedures
Vasilenko K.A., Zolkin A.L., Abramov N.V., Kurganov D.O.
MODELING IS SECURE OF TELECOMMUNICATION CHANNELS WITH USING VIRTUALIZATION
Vasin N.N., Irbakhtin A.A.
QUANTITATIVE CHARACTERISTICS THE SAFE OPERATION OF TELECOMMUNICATION SYSTEMS AND COMPLEX
Falin M.N.
Features of Flash Drives Information Security
Vasilenko K.A., Zolkin A.L., Abramov N.V., Kurganov D.O.
Electromagnetic radiation safety of portable computer devices
Maslov O.N., Panferov D.J.
PRINCIPILES OF IMMEDIATE ELECTROMAGNETIC FIELD MONITORING IN MOBILE NETWORKS
Modenov S.V., Spodobaev M.Y.
Augmented reality: the orifi cal principles, new opportunities and security threats
Maslov O.N.
METHOD FOR MANAGEMENT OF INFORMATION SECURITY IN CORPORATE NETWORKS
Anikin I.V.
THE APPLICATION OF MATHEMATICAL PROGRAMMING FOR SOLVING THE PROBLEM OF DESIGNING THE PROTECTION SYSTEM OF THE OBJECT OF CRITICAL INFRASTRUCTURE
Kartak V.M., Bashmakov N.M.
Expert system applications for industryspecifc information security challenges
Kireeva N.V., Pozdnyak I.S., Filippov N.V.
THREAT EVALUATION AND SUBSTANTIATION OF COUNTERTERRORISM STRATEGY COMPOSITION DURING FRONT-END ENGINEERING DESIGN
Mordashkin V.K.
MODERN ACHIEVEMENTS INTO CRYPTO-BIOMETRIC PROTECTION OF INFORMATION BASED ON HANDWRITING
Bayanov B.I.
Ispol'zovanie mnogoal'ternativnogo sposoba obrabotki informatsii v sistemakh upravleniya bezopasnost'yu
Alekina E.V., Mel'nikova D.A., Yagovkina E.N.
SMART CITY TECHNOLOGIES: INFRASTRUCTURE OF THE FUTURE
Erokhina O.V.
ELECTRODYNAMIC MODEL OF ELECTROMAGNETIC FIELDS RADIATION OF CONICAL HORN ANTENNA FOR PURPOSES OF ELECTROMAGNETIC SAFETY
Kubanov V.P., Ruzhnikov V.A., Spodobaev M.Y.
ON THE QUESTION OF DETECTION MALWARE THAT USE CUDA TECHNOLOGY
Mostovoi J.A., Rakhmaev D.M.
IDENTIFICATION OF DOS ATTACKS BY ANALYSIS OF SOME STATISTICAL CHARACTERISTICS OF TRAFFIC
Pozdnyak I.S., Plavan A.I.
HIERARCHICAL STOCHASTIC MODEL FOR MONITORING OF TREAT TO INFORMATION SECURITY OF INFORMATION SYSTEM
Gubareva O.Y., Osipov O.V., Pugin V.V.
MODERN TECHNIQUES ARE USED TO EVALUATE THREATE AND VULNERABILITIES INFORMATION SYSTEMS
Gubareva O.Y., Pugin V.V.
A BRIEF OVERVIEW OF DATA HIDING METHODS IN DIGITAL IMAGES
Verdiyev S.G., Naghiyeva A.F.
WEB APPLICATION OF ESTIMATING PROTECTION SYSTEM EFFECTIVENESS OF THE ENTERPRISE
Bakhareva N.F., Fedorov S.V.
INCREASE IN THE SAFETY OF COMPUTER SYSTEMS AND NETWORKS ON THE BASIS OF THE ANALYSIS OF NET TRAFFIC
Azhmukhamedov I.M., Marjenkov A.N.
1 - 23 of 23 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies