Issue of Journal № 1, 2 part [25], 2012

List of articles

Mathematical justification and theoretical aspects of information security

Mathematical models of the dynamics of the emergence and implementation of information security threats

Varlataya S. K., Shahanova M. V.

7–11

Algebraic methods of analysis taxonomies of vulnerabilities of computer networks and systems

Vorobiev A. A.

12–14

Analysis of information security systems with the use of quality tools, and dynamic programming method

Danilova O. T., Tolstyh E. N.

15–19

Petri nets, Markov as a tool for creating analytical models for the main types of unauthorized access to the information system

Mironova V. G., Shelupanov A. A., Sopov M. A.

20–24

The method of determining the probability of an attacker unauthorized access to confidential information

Rosenko A. P.

25–28

Rank tests in the problems of information security

Hitsenko V. E.

29–33

Approach to creation protected information model

Konev A. A.

34–39

Decision support for personal data security based on ontological and mutli-agent approaches

Belkov N. V., Vasiliev V. I.

40–46

Security of personal data in information systems

Bogulskaya N. A., Kucherov M. M., Kresan E. A.

47–51

Assessment of efficiency of protection of systems of electronic flow of documents

Buldakova T. I., Glazunov B. V., Lyapina N. S.

52–56

Automated situational analysis of region’s conditions changes based on the deviation model

Ivkin V. B., Lopatin E. A.

57–63

Approach of formation of requirements for IP-telephony information security from threats of average «hacker»

Makarova O. S.

64–68

Predictive decision support in identifying problems of computer attacks

Sumkin K. S., Tverskoy A. N., Morozova T. Yu.

69–73

Methods of protection from the covert channels in the automated systems and their channel capacity at some modes of opposition

Matveev S. V.

74–77

Topicality of information security provisioning in cloud computing systems, cloud computing systems, threats sources analysis

Bogdanov V. V., Novoselova Yu. S.

78–82

Methods of assessing information security risks in small and medium businesses

Pletnev P. V., Belov V. M.

83–86

Temporary model assessment of the risk of information security

Kabanov A. S., Los A. B., Truntsev V. I.

87–91

A mathematical model analysis of multicast routing in multi-service network

Zharikova V. O., Novikov S. N.

92–96

Securing Cisco Systems equipment with access control lists

Ishakov A. Yu., Ishakov S. Yu., Kondratova O. A., Yugov N. T.

97–99

Forecasting in the system of LAN monitoring

Ishakov S. Yu., Shelupanov A. A., Timchenko S. V.

100–103

Early detection of DDOS attacks by statistical methods, taking into seasonal variation

Ternovoy O. S., Shatohin A. S.

104–107

Tests of pseudo-random sequences and implementing their software

Vildanov R. R., Mescheryakov R. V., Bondarchuk S. S.

108–111

Special class of error correcting codes for steganographic systems

Bezzateev S. V., Voloshina N. V., Zhidanov K. A.

112–118

Applications of cellular automata in the field of information security and data processing

Evsyutin O. O., Shelupanov A. A.

119–125

Protection technology to intercept personal information in DLP-systems

Zharinov R. F.

126–130

The method of constructing probabilistic recurrence generators of prime numbers

Kruchinin D. V.

131–135

The application of the algorithm prefix coding scheme of the array data in secret sharing video stream

Fayzullin R. T., Sagaydak D. A.

136–140

Evaluation of time-cost for implementation of distributed brute force attack in heterogeneous systems using time wave systems

Treschev I. A.

141–147

Arithmetic algorithm for solving quadratic equations in finite fields of characteristic two

Glusko K. L., Titov S. S.

148–152

Authentication system using heart sound as biometric

Andreeva E. A.

153–156

The algorithm for generating a cryptographic key based on the singular points of fingerprint

Goncharov S. M., Suhovey A. A.

157–160

Key pair generation based on 3D–face geometry using differential–geometric representation

Goncharov S. M., Pervak A. V.

161–165

User identification based on electroencephalography data using «Brain Computer Interface» technology

Goncharov S. M., Vishnyakov M. S.

166–170

Comparison of parameters for the selection and classification of voiced phonemes segments

Elistratov S. A., Kosenko M. A., Kostyuchenko E. Yu., Chicherin A. A.

171–174

Personal identification system based on integration organization of several biometric characteristics of the person

Sesin E. M., Belov V. M.

175–179

Method errors of estimate of speech intelligibility for information security

Trushin V. A., Reva I. L., Ivanov A. V.

180–184

The pulse noise imitator of nanosecond and microsecond duration

Mitrohin V. E., Ryapolov A. V.

185–188

Protection of information in telecommunication cable lines by means of reduktsionny transformers

Mitrohin V. E., Mitrohin M. V.

189–191

The method of processing the array of initial data obtained by an expert

Rosenko A. P.

192–197

The software simulator of measurement data with the use of products of D-Link Company

Hanin A. G.

198–202

Fragmentation aware QoS scheduling algorithms in WiMax networks

Krupskiy A. S., Boychenko I. V.

203–207

Mathematical method and compression algorithm of multidimensional time series

Kataev S. G., Kataev M. Yu.

208–212

Research of confidentiality ensuring in multiservice network

Novikov S. N., Solonskaya O. I.

213–215

Using natural language to query the billing system

Suranova D. A.

216–219

The complex of programmes for the construction and research of decorrelating cellular transformations and for the compression of digital images on the base of it

Evsyutin O. O.

220–224

Embedded software of high speed IP camera for optical diagnostic of the fleeting processes

Fyodorov S. A.

225–229

Active-passive identification of industrial objects in control systems

Galitskaya L. V.

230–235

Methods of context analysis of applications for mobile heterogeneous devices

Glazkov S. V., Ronzhin A. L.

236–240

The structural synthesis of control system of two-coordinate electromechanical system

Belyaeva N. I., Kurmashev A. D.

241–244

Contouring system of coordinated control of an industrial robot

Shapovalov A. A., Kurmashev A. D.

245–250

Research of three-position relay control the temperature in the sliding mode

Shilin A. A., Bukreev V. G.

251–256

Simulation model of periodic control system for electrodynamic shaker

Godyaev A. I., Eremin E. L., Shelenok E. A.

257–261

Electronics, measurement technology, radio engineering and communications

Calibration of strapdown MEMS acceleration and gyro sensors in inertial navigation systems

Shavrin V. V., Konakov A. S., Tislenko V. I.

265–269

The device of visual light therapy

Bugrov E. V., Bombizov A. A., Romanovskiy M. N.

270–272

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates