|
Issue |
Title |
|
Vol 11, No 2 (2025) |
Decision Functions Model for Metric Methods of Pattern Recognition |
Abstract
PDF (Rus)
|
I. V. Aleksandrov, R. M. Vivchar, R. V. Kirichek |
|
Vol 11, No 2 (2025) |
Method for Calculating Field Convolution Based on the Decomposition of a Multi-Valued Extended Galois Field |
Abstract
PDF (Rus)
|
I. V. Ulyanov |
|
Vol 11, No 2 (2025) |
Implementation of an ECC Digital Signature Technique in Constrained Environments |
Abstract
PDF (Rus)
|
N.H. Sabbry |
|
Vol 11, No 1 (2025) |
Problematic Issues of a Program Representations Genetic De-evolution for Search Vulnerabilities and Recommendations for Its Resolution |
Abstract
PDF (Rus)
|
K. E. Izrailov |
|
Vol 11, No 1 (2025) |
Analyzing and Predicting the Time Series of Cyberattacks on Higher Education Departmental Institution Information System: Methods Opportunities and Limitations |
Abstract
PDF (Rus)
|
V. N. Naumov, M. V. Buinevich, M. Y. Sineshchuk, M. A. Tukmacheva |
|
Vol 11, No 1 (2025) |
Communication Infrastructure Modeling Based on Simulation and Semi-Natural Modeling |
Abstract
PDF (Rus)
|
D. A. Vasinev |
|
Vol 10, No 6 (2024) |
Algorithm for Detecting Reference Points on a Digital Electrocardiogram in Real Time |
Abstract
PDF (Rus)
|
В. K. Akopyan |
|
Vol 10, No 6 (2024) |
Soft Biometrics for Authentication and Identification Hand Based on the Use of the Keyboard |
Abstract
PDF (Rus)
|
Y.M. A.A. Alotoum, A. V. Krasov |
|
Vol 10, No 6 (2024) |
An Algorithm for Synthesizing Groups of Codes in an RFID Multiple Access System |
Abstract
PDF (Rus)
|
N. A. Verzun, A. M. Kolbanev, M. O. Kolbanev |
|
Vol 10, No 6 (2024) |
Advance in Applied Cryptography Theory: Survey and Some New Results. Part 2. Keyless Cryptography |
Abstract
PDF (Rus)
|
V. I. Korzhik, V. A. Yakovlev, V. S. Starostin, M. V. Buinevich |
|
Vol 10, No 6 (2024) |
System for Statistical Measurement of Atomic Efficiency for Graphical Interface Elements |
Abstract
PDF (Rus)
|
P. A. Kurta |
|
Vol 10, No 6 (2024) |
Reducing the Dimensionality of Data Arrays Using Multi-Layer Autoencoders in the Task of Classifying Mobile Applications |
Abstract
PDF (Rus)
|
O. I. Sheluhin, F. A. Matorin |
|
Vol 10, No 5 (2024) |
Justification Models of Organizational and Technical Support of Measures to Create Information Protection System of Informatization Objects |
Abstract
PDF (Rus)
|
O. S. Avsentyev, V. V. Butov, A. G. Valde |
|
Vol 10, No 5 (2024) |
Research on Autonomous Navigation of Unmanned Aerial Vehicles Based on Correlation-Based Image Comparison Methods |
Abstract
PDF (Rus)
|
P. Yu. Belyaev, I. A. Zikratov |
|
Vol 10, No 5 (2024) |
Constant Values Distribution Investigation in the C Programs Source Code |
Abstract
PDF (Rus)
|
K. E. Izrailov |
|
Vol 10, No 4 (2024) |
Energy-Efficient Algorithm for Data Path Selection in High-Density Wireless Sensor Networks |
Abstract
PDF (Rus)
|
T. N. Astakhova, M. O. Kolbanev, A. S. Lyamin, N. S. Maslov, D. A. Maslova |
|
Vol 10, No 4 (2024) |
Ensuring Information Security of Information Systems to be Integrated Based on Trust |
Abstract
PDF (Rus)
|
V. V. Gryzunov, A. S. Krjukov, A. V. Shestakov, I. A. Zikratov |
|
Vol 10, No 4 (2024) |
Advance in Applied Cryptography Theory: Survey and New Results. Part 1. Key Cryptography |
Abstract
PDF (Rus)
|
V. I. Korzhik, V. A. Yakovlev, B. V. Izotov, V. S. Starostin, M. V. Buinevich |
|
Vol 10, No 4 (2024) |
Intelligent Method for Mutation of Input Cases with Feedback |
Abstract
PDF (Rus)
|
N. N. Samarin, A. V. Tulinova |
|
Vol 10, No 3 (2024) |
Swarm Robotics System Algorithm for Defense against Coordinated Behavior Strategy Attacks |
Abstract
PDF (Rus)
|
I. A. Zikratov, T. V. Zikratova, E. A. Novikov |
|
Vol 10, No 3 (2024) |
Optimization of Information Resources Distribution in Common Information Space |
Abstract
PDF (Rus)
|
V. V. Nikolaev, I. B. Saenko |
|
Vol 10, No 3 (2024) |
Estimation of the Multifractal Spectrum Characteristics of Fractal Dimension of Network Traffic and Computer Attacks in IoT |
Abstract
PDF (Rus)
|
O. I. Sheluhin, S. Y. Rybakov, A. V. Vanyushina |
|
Vol 10, No 3 (2024) |
Evaluation of Visual Interfaces in Information Security Management Systems |
Abstract
PDF (Rus)
|
A. A. Chechulin |
|
Vol 10, No 2 (2024) |
Spectral Characteristics Analysis of Images Matrix Masking Results |
Abstract
PDF (Rus)
|
E. Grigoriev |
|
Vol 10, No 2 (2024) |
Technical Systems Effectiveness Management Technique |
Abstract
PDF (Rus)
|
K. Sazonov, R. Mikhailov, A. Ratoushin |
|
Vol 10, No 2 (2024) |
Approach to Detecting Malicious Bots in the Vkontakte Social Network and Assessing Their Parameters |
Abstract
PDF (Rus)
|
A. Chechulin, M. Kolomeets |
|
Vol 10, No 1 (2024) |
Methodology for Reverse Engineering of Machine Code. Part 3. Dynamic Investigation and Documentation |
Abstract
PDF (Rus)
|
K. Izrailov |
|
Vol 10, No 1 (2024) |
Open Dataset for Testing of Visual SLAM Algorithms under Different Weather Conditions |
Abstract
PDF (Rus)
|
A. Podtikhov, A. Saveliev |
|
Vol 9, No 6 (2023) |
Vulnerability Characteristics of Global Navigation Satellite System Consumer Equipment to Spoofing Attacks |
Abstract
PDF (Rus)
|
V. Nerovny, P. Korataev, P. Oblov, M. Tolstykh |
|
Vol 9, No 6 (2023) |
Proposals for Universal Protocol Fuzzer Construction |
Abstract
PDF (Rus)
|
D. Vasinev, M. Solovev |
|
Vol 9, No 6 (2023) |
Methodology for Machine Code Reverse Engineering. Part 2. Static Investigation |
Abstract
PDF (Rus)
|
K. Izrailov |
|
Vol 9, No 6 (2023) |
Machine Learning vs Software Vulnerability Detection: Applicability Analysis and Conceptual System Synthesis |
Abstract
PDF (Rus)
|
N. Leonov, M. Buinevich |
|
Vol 9, No 5 (2023) |
IoT Traffic Fractal Dimension Statistical Characteristics on the Kitsune Dataset Example |
Abstract
PDF (Rus)
|
O. Shelukhin, S. Rybakov |
|
Vol 9, No 5 (2023) |
Methodology for Machine Code Reverse Engineering. Part 1. Preparation of the Research Object |
Abstract
PDF (Rus)
|
K. Izrailov |
|
Vol 9, No 5 (2023) |
A Review of User Identification Methods Based on Digital Fingerprint |
Abstract
PDF (Rus)
|
A. Osin, Y. Murashko |
|
Vol 9, No 5 (2023) |
Traffic Classification Model in Software-Defined Networks with Artificial Intelligence Elements |
Abstract
PDF (Rus)
|
V. Elagin |
|
Vol 9, No 4 (2023) |
Structural and Functional Model of Organizational and Technical Systems Interoperability |
Abstract
PDF (Rus)
|
S. Makarenko, A. Nesterov |
|
Vol 9, No 4 (2023) |
A Method for Routing Traffic in a Three-Dimensional High-Density IoT Network Using Gray Relational Analysis |
Abstract
PDF (Rus)
|
A. Marochkina, A. Paramonov |
|
Vol 9, No 4 (2023) |
A method of Improving the Security of Information and Telecommunications Network Using the Means of Determining Intruder's Geolocation |
Abstract
PDF (Rus)
|
V. Lipatnikov, V. Zadboev, K. Melekhov, A. Shevchenko |
|
Vol 9, No 4 (2023) |
Multivalued Classification of Computer Attacks Using Artificial Neural Networks with Multiple Outputs |
Abstract
PDF (Rus)
|
O. Shelukhin, D. Rakovsky |
|
Vol 9, No 4 (2023) |
Defense Method against an Attack of Incorrect Ballot Filling in a Remote Electronic Voting System |
Abstract
PDF (Rus)
|
V. Yakovlev, V. Salman |
|
Vol 9, No 3 (2023) |
Development of an Accessibility Testing System for the Virtual Machine Deployment Service in the Cloud |
Abstract
PDF (Eng)
|
A. Marchenko, D. Shchemelinin |
|
Vol 9, No 2 (2023) |
Modeling a Program with Vulnerabilities in the Terms of Its Representations Evolution. Part 2. Analytical Model and Experiment |
Abstract
PDF (Rus)
|
K. Izrailov |
|
Vol 9, No 2 (2023) |
Hierarchical Model and Decision Optimization Algorithm for Distributed Data Storage and Processing |
Abstract
PDF (Rus)
|
K. Krotov |
|
Vol 9, No 2 (2023) |
Methods of Protection against Threat: Incorrect Ballot Filling by Voter in the Remote Electronic Voting System |
Abstract
PDF (Rus)
|
V. Yakovlev, V. Salman |
|
Vol 9, No 1 (2023) |
Modeling a Program with Vulnerabilities in the Terms of Its Representations Evolution. Part 1. Life Cycle Scheme |
Abstract
PDF (Rus)
|
K. Izrailov |
|
Vol 9, No 1 (2023) |
Properties of Malicious Social Bots |
Abstract
PDF (Rus)
|
M. Kolomeets, A. Chechulin |
|
Vol 9, No 1 (2023) |
Hierarchical Model for the Design of Microcontroller-Based Systems Protected from Cyber-Physical Attacks |
Abstract
PDF (Rus)
|
D. Levshun |
|
Vol 8, No 4 (2022) |
Models of Blockchain Application in Government Information Systems |
Abstract
PDF (Rus)
|
V. Elagin |
|
Vol 8, No 3 (2022) |
Methods for Adaptive Resource Availability Management of Geoinformation Systems under Destructive Impacts |
Abstract
PDF (Rus)
|
V. Gryzunov |
|
Vol 8, No 3 (2022) |
Modified Algorithm for Detecting Network Attacks Using the Fractal Dimension Jump Estimation Method in Online Mode |
Abstract
PDF (Rus)
|
O. Sheluhin, S. Rybakov, A. Vanyushina |
|
Vol 8, No 2 (2022) |
Computer Synthesis of Neurotransmitter Images |
Abstract
PDF (Rus)
|
L. Makarov, A. Pozdnyakov |
|
Vol 8, No 2 (2022) |
Some New Mathematical Models of Synthesized Sound Signals |
Abstract
PDF (Rus)
|
G. Rogozinsky, M. Chesnokov, A. Kutlyiarova |
|
Vol 8, No 1 (2022) |
A Study of the Possibility of Usage Motion Vectors of Compressed Videos to Create Video Identification |
Abstract
PDF (Rus)
|
R. Fahrutdinov, A. Mirin |
|
Vol 8, No 1 (2022) |
A Study of Methods for Assessing and Parrying the Threat of an Accident of a Helicopter-Type Aircraft |
Abstract
PDF (Rus)
|
A. Kulik |
|
Vol 7, No 4 (2021) |
Decision Support System for Finding an Optimal Postquantum Key Encapsulation Mechanism. Part 2. Prototype Evaluation |
Abstract
PDF (Rus)
|
A. Vlasenko, M. Evsyukov, M. Putyato, A. Makaryan |
|
Vol 7, No 4 (2021) |
Method for Assessing the Sustainability of the Information Direction, Functioning on the Resources of the Communication Network with Failures |
Abstract
PDF (Rus)
|
S. Ivanov |
|
Vol 7, No 4 (2021) |
Genetic Decompilation Concept of the Telecommunication Devices Machine Code |
Abstract
PDF (Rus)
|
K. Izrailov |
|
Vol 7, No 4 (2021) |
Artificial Intelligence-Based Aircraft Accident Threat Parrying Method |
Abstract
PDF (Eng)
|
А. Kulik |
|
Vol 7, No 3 (2021) |
Model of the States of Critical Information Infrastructure Subjects under Destructive Influences in Static Mode |
Abstract
PDF (Rus)
|
E. Maksimova |
|
Vol 7, No 3 (2021) |
Mathematical Models and Methods for Monitoring and Predicting the State of Globally Distributed Computing Systems |
Abstract
PDF (Rus)
|
D. Shchemelinin |
|
Vol 7, No 3 (2021) |
Method for Authentication of Diffie ‒ Hellman Values Based on Pre-Distributed Random Sequences and Wegman ‒ Carter One-Time Pad Algorithm |
Abstract
PDF (Rus)
|
V. Yakovlev |
|
Vol 7, No 2 (2021) |
Theoretical Foundations Development of Space Adaptive Video Information Systems Synthesis |
Abstract
PDF (Rus)
|
A. I. Bobrovskiy |
|
Vol 7, No 2 (2021) |
Elaboration of Digital Watermarking Method for a Protection of Cloning Attack on Paper Certificates |
Abstract
PDF (Rus)
|
V. I. Korzhik, V. S. Starostin, D. A. Flaksman |
|
Vol 7, No 2 (2021) |
Digital Signature Scheme with Hidden Group Possessing Two-Dimensional Cyclicity |
Abstract
PDF (Rus)
|
D. N. Moldovyan, R. Sh. Fahrutdinov, A. Yu. Mirin, A. A. Kostina |
|
1 - 65 of 65 Items |
|