Preview

Proceedings of Telecommunication Universities

Advanced search

Section Details


INFORMATICS, COMPUTER ENGINEERING AND MANAGEMENT

 
Issue Title
 
Vol 7, No 1 (2021) Model of Security Audit of a Critical Information Infrastructure Object with Use the Test Cyber Attacks Abstract   PDF (Rus)
S. Makarenko, G. Smirnov
 
Vol 7, No 1 (2021) Organization of Web-Based Environmental Monitoring Service Using Earth Remote Sensing Data and Pipelining Data Processing Abstract   PDF (Rus)
A. Scatkov, К. Krotov
 
Vol 5, No 3 (2019) Система цифровых водяных знаков с возможностью их извлечения из бумажных копий цифровых документов Abstract   PDF (Rus)
V. .. Korzhik, D. .. Flaksman
 
Vol 6, No 3 (2020) Building Complex Schedules of Data Packets Processing with Setting Time Limits of a Conveyor System Functioning Abstract   PDF (Rus)
K. .. Krotov
 
Vol 5, No 3 (2019) Scalable Honeypot Solution for Corporate Networks Security Provision Abstract   PDF (Rus)
A. .. Krasov, R. .. Petriv, D. .. Sakharov, N. .. Storozhuk, I. .. Ushakov
 
Vol 6, No 4 (2020) Decision Support System for Finding an Optimal Postquantum Key Encapsulation Mechanism. Part 1. Decision Making Algorithm Abstract   PDF (Rus)
A. .. Vlasenko, M. .. Evsyukov, M. .. Putyato, A. .. Makaryan
 
Vol 5, No 3 (2019) Mathematical Modeling and Numerical Methods of the Analysis of Neural Structures Abstract   PDF (Rus)
L. .. Makarov, A. .. Pozdnyakov, S. .. Protasenya, D. .. Ivanov, V. .. Lvov, S. .. Lvov
 
Vol 6, No 4 (2020) Preprocessing of the Emails in the Spam Detection Task Abstract   PDF (Rus)
S. .. Korelov, A. .. Petrov, L. .. Rotkov, A. .. Gorbunov
 
Vol 5, No 4 (2019) Morphological Method of Combinatorial Synthesis of Bus-Modular Systems Based on Multi-Aspect Models Abstract   PDF (Rus)
G. .. Verkhova, H. .. Khoder
 
Vol 6, No 4 (2020) Cognitive Modeling of Destructive Malicious Impacts on Critical Information Infrastructure Objects Abstract   PDF (Rus)
E. .. Maksimova
 
Vol 5, No 4 (2019) Event-based Security Policy and Formal Model of Critical Information Infrastructures Protecting Mechanism Abstract   PDF (Rus)
S. .. Erokhin, A. .. Petukhov, P. .. Pilyugin
 
Vol 6, No 4 (2020) Creation and Implementation of Information Reserves in Big Technical Systems Maintenance Abstract   PDF (Rus)
A. .. Shestakov, K. .. Biliatdinov
 
Vol 5, No 4 (2019) Pattern Radar Images Formation’s Like a Stochastic Differential Equations for Recognition of Space Objects Abstract   PDF (Rus)
A. .. Kadochnikov, A. .. Kazantsev, O. .. Mishukov, S. .. Shigorev
 
Vol 5, No 4 (2019) A Comprehensive Model of Secure Cyber-Physical Systems for their Design and Verification Abstract   PDF (Rus)
D. .. Levshun, A. .. Chechulin, I. .. Kotenko
 
Vol 6, No 1 (2020) Detection of Video Steganography with the Use of Universal Method Based on NIST-Tests Abstract   PDF (Rus)
K. .. Akhrameeva, V. .. Korzhik, C. .. Nguyen
 
Vol 6, No 1 (2020) Identification of Processor’s Architecture of Executable Code Based on Machine Learning. Part 1. Frequency Byte Model Abstract   PDF (Rus)
M. .. Buinevich, K. .. Izrailov
 
Vol 6, No 1 (2020) Refinement Algoritm of Hypotheses Testing Research Based on Geochronological Tracking Abstract   PDF (Rus)
R. Y. Ivakin, Y. A. Ivakin, S. N. Potapichev
 
Vol 5, No 2 (2019) Detecting of Audio Stegosystems with Information Embedding Based on Modulated Reverberation Abstract   PDF (Rus)
V. .. Alekseev, V. .. Korzhik
 
Vol 6, No 1 (2020) Methodology for Detecting Anomalous Interaction of Users with Information Assets to Identify Insider Activity Abstract   PDF (Rus)
M. .. Polyanichko
 
Vol 5, No 2 (2019) Path Loss Modelling in Millimeter Wave Radio Chanel by the Parabolic Equation Method Abstract   PDF (Rus)
A. .. Vladyko, M. .. Lytaev
 
Vol 6, No 2 (2020) Identification of Processor’s Architectureof Executable Code Based on Machine Learning.Part 2. Identification Method Abstract   PDF (Rus)
M. .. Buinevich, K. .. Izrailov
 
Vol 5, No 2 (2019) Joint Distributions with Improved Contrast of Signal Components in Time-Frequency Space: Continued Review Abstract   PDF (Rus)
S. .. Dvornikov
 
Vol 6, No 2 (2020) A Model of Synthesis of Distributed Attacking Elements in a Computer Network Abstract   PDF (Rus)
M. .. Petrov, R. .. Fatkieva
 
Vol 5, No 2 (2019) Study of the Impact of Timeliness of Command Transmission in an Air Radio Communication Network on the Guidance Quality of an Aircraft at a Target Abstract   PDF (Rus)
S. .. Makarenko, A. .. Ponamorev
 
Vol 6, No 3 (2020) Identification of Processor’s Architecture of Executable Code Based on Machine Learning. Part 3. Assessment Quality and Applicability Border Abstract   PDF (Rus)
M. .. Buinevich, K. .. Izrailov
 
Vol 5, No 3 (2019) The Technique of Multi-aspect Evaluation and Categorization of Malicious Information Objects on the Internet Abstract   PDF (Rus)
A. .. Branitskiy, I. .. Saenko
 
Vol 6, No 3 (2020) Method for Validating Graph Models Based on the Effective Control Algorithm Abstract   PDF (Rus)
V. .. Vasiliev, A. .. Tselykh, L. .. Tselykh
 
Vol 5, No 3 (2019) Presentation of Joint Time-Frequency Distributions on the Basis of Indicative and Power-Transformation of their Density of them in Time-Frequency Space: Completion of Review Abstract   PDF (Rus)
S. .. Dvornikov
 
Vol 6, No 3 (2020) About the Comparison of Information Security Systems for Asymptotic Information Security Management of Critical Information Infrastructures Abstract   PDF (Rus)
S. .. Erokhin, A. .. Petukhov, P. .. Pilyugin
 
1 - 29 of 29 Items