Mathematical models of the dynamics of the emergence and implementation of information security threats
Varlataya S. K., Shahanova M. V.
|
7–11
|
Algebraic methods of analysis taxonomies of vulnerabilities of computer networks and systems
Vorobiev A. A.
|
12–14
|
Analysis of information security systems with the use of quality tools, and dynamic programming method
Danilova O. T., Tolstyh E. N.
|
15–19
|
Petri nets, Markov as a tool for creating analytical models for the main types of unauthorized access to the information system
Mironova V. G., Shelupanov A. A., Sopov M. A.
|
20–24
|
The method of determining the probability of an attacker unauthorized access to confidential information
Rosenko A. P.
|
25–28
|
Rank tests in the problems of information security
Hitsenko V. E.
|
29–33
|
Approach to creation protected information model
Konev A. A.
|
34–39
|
Decision support for personal data security based on ontological and mutli-agent approaches
Belkov N. V., Vasiliev V. I.
|
40–46
|
Security of personal data in information systems
Bogulskaya N. A., Kucherov M. M., Kresan E. A.
|
47–51
|
Assessment of efficiency of protection of systems of electronic flow of documents
Buldakova T. I., Glazunov B. V., Lyapina N. S.
|
52–56
|
Automated situational analysis of region’s conditions changes based on the deviation model
Ivkin V. B., Lopatin E. A.
|
57–63
|
Approach of formation of requirements for IP-telephony information security from threats of average «hacker»
Makarova O. S.
|
64–68
|
Predictive decision support in identifying problems of computer attacks
Sumkin K. S., Tverskoy A. N., Morozova T. Yu.
|
69–73
|
Methods of protection from the covert channels in the automated systems and their channel capacity at some modes of opposition
Matveev S. V.
|
74–77
|
Topicality of information security provisioning in cloud computing systems, cloud computing systems, threats sources analysis
Bogdanov V. V., Novoselova Yu. S.
|
78–82
|
Methods of assessing information security risks in small and medium businesses
Pletnev P. V., Belov V. M.
|
83–86
|
Temporary model assessment of the risk of information security
Kabanov A. S., Los A. B., Truntsev V. I.
|
87–91
|
A mathematical model analysis of multicast routing in multi-service network
Zharikova V. O., Novikov S. N.
|
92–96
|
Securing Cisco Systems equipment with access control lists
Ishakov A. Yu., Ishakov S. Yu., Kondratova O. A., Yugov N. T.
|
97–99
|
Forecasting in the system of LAN monitoring
Ishakov S. Yu., Shelupanov A. A., Timchenko S. V.
|
100–103
|
Early detection of DDOS attacks by statistical methods, taking into seasonal variation
Ternovoy O. S., Shatohin A. S.
|
104–107
|
Tests of pseudo-random sequences and implementing their software
Vildanov R. R., Mescheryakov R. V., Bondarchuk S. S.
|
108–111
|
Special class of error correcting codes for steganographic systems
Bezzateev S. V., Voloshina N. V., Zhidanov K. A.
|
112–118
|
Applications of cellular automata in the field of information security and data processing
Evsyutin O. O., Shelupanov A. A.
|
119–125
|
Protection technology to intercept personal information in DLP-systems
Zharinov R. F.
|
126–130
|
The method of constructing probabilistic recurrence generators of prime numbers
Kruchinin D. V.
|
131–135
|
The application of the algorithm prefix coding scheme of the array data in secret sharing video stream
Fayzullin R. T., Sagaydak D. A.
|
136–140
|
Evaluation of time-cost for implementation of distributed brute force attack in heterogeneous systems using time wave systems
Treschev I. A.
|
141–147
|
Arithmetic algorithm for solving quadratic equations in finite fields of characteristic two
Glusko K. L., Titov S. S.
|
148–152
|
Authentication system using heart sound as biometric
Andreeva E. A.
|
153–156
|
The algorithm for generating a cryptographic key based on the singular points of fingerprint
Goncharov S. M., Suhovey A. A.
|
157–160
|
Key pair generation based on 3D–face geometry using differential–geometric representation
Goncharov S. M., Pervak A. V.
|
161–165
|
User identification based on electroencephalography data using «Brain Computer Interface» technology
Goncharov S. M., Vishnyakov M. S.
|
166–170
|
Comparison of parameters for the selection and classification of voiced phonemes segments
Elistratov S. A., Kosenko M. A., Kostyuchenko E. Yu., Chicherin A. A.
|
171–174
|
Personal identification system based on integration organization of several biometric characteristics of the person
Sesin E. M., Belov V. M.
|
175–179
|
Method errors of estimate of speech intelligibility for information security
Trushin V. A., Reva I. L., Ivanov A. V.
|
180–184
|
The pulse noise imitator of nanosecond and microsecond duration
Mitrohin V. E., Ryapolov A. V.
|
185–188
|
Protection of information in telecommunication cable lines by means of reduktsionny transformers
Mitrohin V. E., Mitrohin M. V.
|
189–191
|
The method of processing the array of initial data obtained by an expert
Rosenko A. P.
|
192–197
|
The software simulator of measurement data with the use of products of D-Link Company
Hanin A. G.
|
198–202
|
Fragmentation aware QoS scheduling algorithms in WiMax networks
Krupskiy A. S., Boychenko I. V.
|
203–207
|
Mathematical method and compression algorithm of multidimensional time series
Kataev S. G., Kataev M. Yu.
|
208–212
|
Research of confidentiality ensuring in multiservice network
Novikov S. N., Solonskaya O. I.
|
213–215
|
Using natural language to query the billing system
Suranova D. A.
|
216–219
|
The complex of programmes for the construction and research of decorrelating cellular transformations and for the compression of digital images on the base of it
Evsyutin O. O.
|
220–224
|
Embedded software of high speed IP camera for optical diagnostic of the fleeting processes
Fyodorov S. A.
|
225–229
|
Active-passive identification of industrial objects in control systems
Galitskaya L. V.
|
230–235
|
Methods of context analysis of applications for mobile heterogeneous devices
Glazkov S. V., Ronzhin A. L.
|
236–240
|
The structural synthesis of control system of two-coordinate electromechanical system
Belyaeva N. I., Kurmashev A. D.
|
241–244
|
Contouring system of coordinated control of an industrial robot
Shapovalov A. A., Kurmashev A. D.
|
245–250
|
Research of three-position relay control the temperature in the sliding mode
Shilin A. A., Bukreev V. G.
|
251–256
|
Simulation model of periodic control system for electrodynamic shaker
Godyaev A. I., Eremin E. L., Shelenok E. A.
|
257–261
|