Search

Issue
Title
Authors
Numerical method for calculating the locations of safety system repeaters on terrain with obstacles
Startsev D.Y., Loginov I.V., Sosunov V.G., Pligunov O.V.
MODERN TECHNIQUES ARE USED TO EVALUATE THREATE AND VULNERABILITIES INFORMATION SYSTEMS
Gubareva O.Y., Pugin V.V.
THE APPLICATION OF MATHEMATICAL PROGRAMMING FOR SOLVING THE PROBLEM OF DESIGNING THE PROTECTION SYSTEM OF THE OBJECT OF CRITICAL INFRASTRUCTURE
Kartak V.M., Bashmakov N.M.
BASES OF INFORMATION SECURITY IN DEVELOPING SITES
Yuldashev T.Z., Sheptunov S.A.
SIMULATION MODEL FOR RESEARCHING THE USER BEHAVIOR IN DISTRIBUTED INFORMATION COMPUTER SYSTEMS
Ryapolova E.I., Studyannikova M.A.
DATA SECURITY AND CONTROLLING INTERRUPTION OF THE DATA COMMUNICATION PATH IN THE SESSION MODE
Mostovoj J.A., Slepushov I.I.
ON THE QUESTION OF DETECTION MALWARE THAT USE CUDA TECHNOLOGY
Mostovoi J.A., Rakhmaev D.M.
DEVELOPMENT OF A METHOD FOR MONITORING ANAMOUS BEHAVIOR OF A USER IN A DISTRIBUTED INFORMATION COMPUTER SYSTEM: BUILDING A MATHEMATICAL MODEL
Ryapolova E.I., Presnov A.A., Tsvetkova K.E.
HIERARCHICAL STOCHASTIC MODEL FOR MONITORING OF TREAT TO INFORMATION SECURITY OF INFORMATION SYSTEM
Gubareva O.Y., Osipov O.V., Pugin V.V.
IDENTIFICATION OF DOS ATTACKS BY ANALYSIS OF SOME STATISTICAL CHARACTERISTICS OF TRAFFIC
Pozdnyak I.S., Plavan A.I.
WEB APPLICATION OF ESTIMATING PROTECTION SYSTEM EFFECTIVENESS OF THE ENTERPRISE
Bakhareva N.F., Fedorov S.V.
PROTECTION OF TRANSFER STEGAMESSAGES IN IMAGES
Azhmuhamedov I.M., Kolesova N.A.
A BRIEF OVERVIEW OF DATA HIDING METHODS IN DIGITAL IMAGES
Verdiyev S.G., Naghiyeva A.F.
MODELING IS SECURE OF TELECOMMUNICATION CHANNELS WITH USING VIRTUALIZATION
Vasin N.N., Irbakhtin A.A.
INCREASE IN THE SAFETY OF COMPUTER SYSTEMS AND NETWORKS ON THE BASIS OF THE ANALYSIS OF NET TRAFFIC
Azhmukhamedov I.M., Marjenkov A.N.
Features of Flash Drives Information Security
Vasilenko K.A., Zolkin A.L., Abramov N.V., Kurganov D.O.
INTEGRATED ASSESSMENT OF INFORMATION SECURITY REQUIREMENTS IMPLEMENTATION IN AUTOMATED CONTROL SYSTEMS INTENDED FOR PRODUCTION AND TECHNOLOGICAL PROCESSES
Vasilyev V.I., Vulfin A.M., Guzairov M.B., Kirillova A.D.
SPATIAL FREQUENCY CHARACTERISTICS OF ELECTROMAGNETIC EXCITATION OF COMPLEX RANDOM ANTENNAS
Zasedateleva P.S., Maslov O.H.
Augmented reality: the orifi cal principles, new opportunities and security threats
Maslov O.N.
ALGORITHMIZATION OF NON-REFLECTIVE SYSTEMS QUASIOPTIMAL CONTROL USING STATISTICAL SIMULATION MODELLING
Dimov E.M., Maslov O.N.
INTRACORPORATE COMPETITION AS A BUSINESS SECURITY THREAT
Maslov O.N.
MODERN ACHIEVEMENTS INTO CRYPTO-BIOMETRIC PROTECTION OF INFORMATION BASED ON HANDWRITING
Bayanov B.I.
Expert system applications for industryspecifc information security challenges
Kireeva N.V., Pozdnyak I.S., Filippov N.V.
METHOD FOR MANAGEMENT OF INFORMATION SECURITY IN CORPORATE NETWORKS
Anikin I.V.
PROCESSING OF RESULTS OF THE EXPERT ASSESSMENT OF DAMAGE TO INFORMATION SYSTEM FOR THE CONCLUSION OF INTEGRATED FUNCTION OF THE ACCESSORY
Dubinin E.A., Kopytov V.V., Tebueva F.B.
SMART CITY TECHNOLOGIES: INFRASTRUCTURE OF THE FUTURE
Erokhina O.V.
GENERALIZED INVARIANT METHOD MESSAGING AND ASSESSMENT OF ITS INFORMATION SECURITY
Lebedyantsev V.V.
FEATURES OF MODELING OF MODES EXCITATION OF MULTI-CHANNEL RANDOM ANTENNAS
Zasedateleva P.S., Maslov O.N., Ryabushkin A.V., Scherbakova T.A.
1 - 28 of 28 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies