Search

Issue
Title
Authors
Numerical method for calculating the locations of safety system repeaters on terrain with obstacles
Startsev D.Y., Loginov I.V., Sosunov V.G., Pligunov O.V.
MODERN TECHNIQUES ARE USED TO EVALUATE THREATE AND VULNERABILITIES INFORMATION SYSTEMS
Gubareva O.Y., Pugin V.V.
THE APPLICATION OF MATHEMATICAL PROGRAMMING FOR SOLVING THE PROBLEM OF DESIGNING THE PROTECTION SYSTEM OF THE OBJECT OF CRITICAL INFRASTRUCTURE
Kartak V.M., Bashmakov N.M.
HIERARCHICAL STOCHASTIC MODEL FOR MONITORING OF TREAT TO INFORMATION SECURITY OF INFORMATION SYSTEM
Gubareva O.Y., Osipov O.V., Pugin V.V.
BASES OF INFORMATION SECURITY IN DEVELOPING SITES
Yuldashev T.Z., Sheptunov S.A.
A BRIEF OVERVIEW OF DATA HIDING METHODS IN DIGITAL IMAGES
Verdiyev S.G., Naghiyeva A.F.
SIMULATION MODEL FOR RESEARCHING THE USER BEHAVIOR IN DISTRIBUTED INFORMATION COMPUTER SYSTEMS
Ryapolova E.I., Studyannikova M.A.
DEVELOPMENT OF A METHOD FOR MONITORING ANAMOUS BEHAVIOR OF A USER IN A DISTRIBUTED INFORMATION COMPUTER SYSTEM: BUILDING A MATHEMATICAL MODEL
Ryapolova E.I., Presnov A.A., Tsvetkova K.E.
WEB APPLICATION OF ESTIMATING PROTECTION SYSTEM EFFECTIVENESS OF THE ENTERPRISE
Bakhareva N.F., Fedorov S.V.
INTEGRATED ASSESSMENT OF INFORMATION SECURITY REQUIREMENTS IMPLEMENTATION IN AUTOMATED CONTROL SYSTEMS INTENDED FOR PRODUCTION AND TECHNOLOGICAL PROCESSES
Vasilyev V.I., Vulfin A.M., Guzairov M.B., Kirillova A.D.
DATA SECURITY AND CONTROLLING INTERRUPTION OF THE DATA COMMUNICATION PATH IN THE SESSION MODE
Mostovoj J.A., Slepushov I.I.
PROTECTION OF TRANSFER STEGAMESSAGES IN IMAGES
Azhmuhamedov I.M., Kolesova N.A.
METHOD FOR MANAGEMENT OF INFORMATION SECURITY IN CORPORATE NETWORKS
Anikin I.V.
PROCESSING OF RESULTS OF THE EXPERT ASSESSMENT OF DAMAGE TO INFORMATION SYSTEM FOR THE CONCLUSION OF INTEGRATED FUNCTION OF THE ACCESSORY
Dubinin E.A., Kopytov V.V., Tebueva F.B.
Expert system applications for industryspecifc information security challenges
Kireeva N.V., Pozdnyak I.S., Filippov N.V.
GENERALIZED INVARIANT METHOD MESSAGING AND ASSESSMENT OF ITS INFORMATION SECURITY
Lebedyantsev V.V.
IDENTIFICATION OF DOS ATTACKS BY ANALYSIS OF SOME STATISTICAL CHARACTERISTICS OF TRAFFIC
Pozdnyak I.S., Plavan A.I.
MODELING IS SECURE OF TELECOMMUNICATION CHANNELS WITH USING VIRTUALIZATION
Vasin N.N., Irbakhtin A.A.
SPATIAL FREQUENCY CHARACTERISTICS OF ELECTROMAGNETIC EXCITATION OF COMPLEX RANDOM ANTENNAS
Zasedateleva P.S., Maslov O.H.
FEATURES OF MODELING OF MODES EXCITATION OF MULTI-CHANNEL RANDOM ANTENNAS
Zasedateleva P.S., Maslov O.N., Ryabushkin A.V., Scherbakova T.A.
MODERN ACHIEVEMENTS INTO CRYPTO-BIOMETRIC PROTECTION OF INFORMATION BASED ON HANDWRITING
Bayanov B.I.
Features of Flash Drives Information Security
Vasilenko K.A., Zolkin A.L., Abramov N.V., Kurganov D.O.
1 - 22 of 22 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies