|
Issue |
Title |
|
Vol 7, No 1 (2021) |
Model of Security Audit of a Critical Information Infrastructure Object with Use the Test Cyber Attacks |
Abstract
PDF (Rus)
|
S. Makarenko, G. Smirnov |
|
Vol 7, No 1 (2021) |
Organization of Web-Based Environmental Monitoring Service Using Earth Remote Sensing Data and Pipelining Data Processing |
Abstract
PDF (Rus)
|
A. Scatkov, К. Krotov |
|
Vol 5, No 3 (2019) |
Система цифровых водяных знаков с возможностью их извлечения из бумажных копий цифровых документов |
Abstract
PDF (Rus)
|
V. .. Korzhik, D. .. Flaksman |
|
Vol 6, No 3 (2020) |
Building Complex Schedules of Data Packets Processing with Setting Time Limits of a Conveyor System Functioning |
Abstract
PDF (Rus)
|
K. .. Krotov |
|
Vol 5, No 3 (2019) |
Scalable Honeypot Solution for Corporate Networks Security Provision |
Abstract
PDF (Rus)
|
A. .. Krasov, R. .. Petriv, D. .. Sakharov, N. .. Storozhuk, I. .. Ushakov |
|
Vol 6, No 4 (2020) |
Decision Support System for Finding an Optimal Postquantum Key Encapsulation Mechanism. Part 1. Decision Making Algorithm |
Abstract
PDF (Rus)
|
A. .. Vlasenko, M. .. Evsyukov, M. .. Putyato, A. .. Makaryan |
|
Vol 5, No 3 (2019) |
Mathematical Modeling and Numerical Methods of the Analysis of Neural Structures |
Abstract
PDF (Rus)
|
L. .. Makarov, A. .. Pozdnyakov, S. .. Protasenya, D. .. Ivanov, V. .. Lvov, S. .. Lvov |
|
Vol 6, No 4 (2020) |
Preprocessing of the Emails in the Spam Detection Task |
Abstract
PDF (Rus)
|
S. .. Korelov, A. .. Petrov, L. .. Rotkov, A. .. Gorbunov |
|
Vol 5, No 4 (2019) |
Morphological Method of Combinatorial Synthesis of Bus-Modular Systems Based on Multi-Aspect Models |
Abstract
PDF (Rus)
|
G. .. Verkhova, H. .. Khoder |
|
Vol 6, No 4 (2020) |
Cognitive Modeling of Destructive Malicious Impacts on Critical Information Infrastructure Objects |
Abstract
PDF (Rus)
|
E. .. Maksimova |
|
Vol 5, No 4 (2019) |
Event-based Security Policy and Formal Model of Critical Information Infrastructures Protecting Mechanism |
Abstract
PDF (Rus)
|
S. .. Erokhin, A. .. Petukhov, P. .. Pilyugin |
|
Vol 6, No 4 (2020) |
Creation and Implementation of Information Reserves in Big Technical Systems Maintenance |
Abstract
PDF (Rus)
|
A. .. Shestakov, K. .. Biliatdinov |
|
Vol 5, No 4 (2019) |
Pattern Radar Images Formation’s Like a Stochastic Differential Equations for Recognition of Space Objects |
Abstract
PDF (Rus)
|
A. .. Kadochnikov, A. .. Kazantsev, O. .. Mishukov, S. .. Shigorev |
|
Vol 5, No 4 (2019) |
A Comprehensive Model of Secure Cyber-Physical Systems for their Design and Verification |
Abstract
PDF (Rus)
|
D. .. Levshun, A. .. Chechulin, I. .. Kotenko |
|
Vol 6, No 1 (2020) |
Detection of Video Steganography with the Use of Universal Method Based on NIST-Tests |
Abstract
PDF (Rus)
|
K. .. Akhrameeva, V. .. Korzhik, C. .. Nguyen |
|
Vol 6, No 1 (2020) |
Identification of Processor’s Architecture of Executable Code Based on Machine Learning. Part 1. Frequency Byte Model |
Abstract
PDF (Rus)
|
M. .. Buinevich, K. .. Izrailov |
|
Vol 6, No 1 (2020) |
Refinement Algoritm of Hypotheses Testing Research Based on Geochronological Tracking |
Abstract
PDF (Rus)
|
R. Y. Ivakin, Y. A. Ivakin, S. N. Potapichev |
|
Vol 5, No 2 (2019) |
Detecting of Audio Stegosystems with Information Embedding Based on Modulated Reverberation |
Abstract
PDF (Rus)
|
V. .. Alekseev, V. .. Korzhik |
|
Vol 6, No 1 (2020) |
Methodology for Detecting Anomalous Interaction of Users with Information Assets to Identify Insider Activity |
Abstract
PDF (Rus)
|
M. .. Polyanichko |
|
Vol 5, No 2 (2019) |
Path Loss Modelling in Millimeter Wave Radio Chanel by the Parabolic Equation Method |
Abstract
PDF (Rus)
|
A. .. Vladyko, M. .. Lytaev |
|
Vol 6, No 2 (2020) |
Identification of Processor’s Architectureof Executable Code Based on Machine Learning.Part 2. Identification Method |
Abstract
PDF (Rus)
|
M. .. Buinevich, K. .. Izrailov |
|
Vol 5, No 2 (2019) |
Joint Distributions with Improved Contrast of Signal Components in Time-Frequency Space: Continued Review |
Abstract
PDF (Rus)
|
S. .. Dvornikov |
|
Vol 6, No 2 (2020) |
A Model of Synthesis of Distributed Attacking Elements in a Computer Network |
Abstract
PDF (Rus)
|
M. .. Petrov, R. .. Fatkieva |
|
Vol 5, No 2 (2019) |
Study of the Impact of Timeliness of Command Transmission in an Air Radio Communication Network on the Guidance Quality of an Aircraft at a Target |
Abstract
PDF (Rus)
|
S. .. Makarenko, A. .. Ponamorev |
|
Vol 6, No 3 (2020) |
Identification of Processor’s Architecture of Executable Code Based on Machine Learning. Part 3. Assessment Quality and Applicability Border |
Abstract
PDF (Rus)
|
M. .. Buinevich, K. .. Izrailov |
|
Vol 5, No 3 (2019) |
The Technique of Multi-aspect Evaluation and Categorization of Malicious Information Objects on the Internet |
Abstract
PDF (Rus)
|
A. .. Branitskiy, I. .. Saenko |
|
Vol 6, No 3 (2020) |
Method for Validating Graph Models Based on the Effective Control Algorithm |
Abstract
PDF (Rus)
|
V. .. Vasiliev, A. .. Tselykh, L. .. Tselykh |
|
Vol 5, No 3 (2019) |
Presentation of Joint Time-Frequency Distributions on the Basis of Indicative and Power-Transformation of their Density of them in Time-Frequency Space: Completion of Review |
Abstract
PDF (Rus)
|
S. .. Dvornikov |
|
Vol 6, No 3 (2020) |
About the Comparison of Information Security Systems for Asymptotic Information Security Management of Critical Information Infrastructures |
Abstract
PDF (Rus)
|
S. .. Erokhin, A. .. Petukhov, P. .. Pilyugin |
|
1 - 29 of 29 Items |
|