Issue of Journal № 1, 2 part [19], 2009

List of articles

Technical methods and means of information security

Impact switching overvoltage on stability functioning and information security telecommunications system

Mitrohin V. E., Fedotov D. A.

5–7

Calculating and designing changeable active filters

Urbanovich P. V., Shelupanov A. A.

8–12

Research of loss of confidential infirmation on food chains and grounding

Bekmachev A. E.

13–15

Technology of the integral use of control-searching devices

Dzyuin S. V., Muhin K. V.

16–17

Cryptographic methods of information protection

Structural identification algorithms of cryptosystems’ mathematical models by way of base parametrs finding

Gorbunov A. A.

21–23

Using of parallel backtracking, as graph marking in wide tree traverse, on systems with SMP-architecture for solving search problems

Treschev I. A.

24–26

Effective control of quantum spin registers

Kucherov M. M.

27–29

Information security audit

Mathematical model of the rating of influence of the profit received from use of the confidential information on size of probable damage to the proprietor of the information of the limited distribution

Rosenko A. P., Avetisov R. S.

33–35

Authorship identification technique on basis of support vector machine

Romanov A. S.

36–42

Automatic security control as a technique providing systems integrity

Kalinin M. O.

43–45

The problems of the defence and processing of confidential documents

Varlataya S. K., Shahanova M. V.

46–48

On the using of Petri nets for computer attack modeling

Horkov D. A.

49–50

Information security risk assessment for corporate information system

Nechunaev V. M.

51–53

Processing of the natural information on the basis of neural networks

Kostyuchenko E. Yu.

54–56

Security of information systems

Development of algorithms of the protected applications for social cards

Bogulskaya N. A., Kucherov M. M., Kushnir V. P.

59–61

Protected terminal system

Rozhkov S. A.

62–64

Routing in ad-hoc networks

Karmanov M. L.

65–66

Protection of the personal medical data in the automated medical intelligence systems of treatment-and-prophylactic establishments

Zykov V. D., Mescheryakov R. V., Belyakov K. O.

67–70

Structurization of threats of a corporate network

Prokopov I. I.

71–72

Conception of scheme for automation of personal data processing

Varlataya S. K., Kondratieva M. V.

73–74

Functional signature of computer viruses

Zbitskiy P. V.

75–76

Distributed computers protection from self-propagating network viruses

Bulahov N. G.

77–78

Anomaly network activity detection

Sapozhnikov A. A.

79–80

Development of the automated management system by the distributed elevators on the base of wireless technologies

Melnikov M. I.

81–82

Securing integrity in multiservice networks

Novikov S. N., Solonskaya O. I.

83–85

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates