Issue of Journal № 2, 1 part [18], 2008

List of articles

Technical science

Use test phase formation noise signals in systems of protection of the information

Dzyuin S. V., Muhin K. V.

7–8

Noise generator with tuning ranges

Urbanovich P. V.

9–11

Evaluation of side electromagnetic radiation of electronic devices

Shelupanov A. A., Zaytsev A. P.

12–17

Information safety of objects of district: the automated materials decoding of space shooting

Smetanin A. M.

18–19

Multifunctional laboratory stand with variable electric circuit based on EPLD

Hanov V. H., Shahmatov A. V.

20–21

Physical protection systems modeling

Vergeychik A. V., Kushnir V. P.

22–23

Pulse self-adjusted watching systems

Beynarovich V. A.

24–27

To optimization of a choice of capacity of a shuttertransistors KMDP of gates

Torgonskiy L. A.

28–29

Fuzzy biometric data prevents implementation of biometric technologies in cryptography

Kosolapov D. O., Harin E. A., Goncharov S. M., Kornyushin P. N.

30–31

Problem of creation of the safe software and the offers under its decision

Zhidkov I. V., Fedorets O. N.

32–33

Localization of automobile numbers by a method of splitting of the image on blocks

Ochakovskiy D. O., Elizarov A. I.

34–39

Non-parametric statistic method application on picture identification problem

Gubanov N. Yu., Kalayda V. T.

40–42

New approaches to software-technical protection of network publications

Barilnik S. S., Gerasimov N. E., Minin I. V., Minin O. V.

43–46

Some approaches to a choice of parameters of a voice for an estimation of the validity of the statement

Mescheryakov R. V., Konev A. A., Yudin A. I.

47–50

This article describes three multilinear based cryptosystems

Kosolapov D. O., Harin E. A., Goncharov S. M., Kornyushin P. N.

51–53

Global optimization problems associated with cryptographic analysis of asymmetric ciphers

Dulkeyt V. I., Fayzullin R. T., Hnykin I. G.

54–55

The statistical analysis of stream ciphers

Igonichkina E. V.

56–57

Communication channel modeling method on splash randomize process theory base

Dzyuin S. V., Bekmachev A. E., Muhin K. V.

58–60

Ideal stegographic systems

Ryabko B. Ya., Fionov A. N.

61–62

Stegoanalyze graphic data in various formats

Zhilkin M. Yu.

63–64

The calculating entropy the system on the basis of simulation dynamics a subjects for method Monte-Carlo

Filimonov Yu. M.

65–66

Approaches to designing protected archives based on secret division

Kruchinin V. V., Shelupanov A. A.

67–72

Struggle with insiders attacks: the system approach

Epifantsev B. N.

73–74

The structure of protection system software for the workplace processing personal medical data

Zykov V. D.

75–77

Self-propagating viruses detection and neutralization methods

Bulahov N. G., Kalayda V. T.

78–82

Structure symbol recognitions method review

Afonasenko A. V., Elizarov A. I.

83–88

Universal identification – the important means of struggle with cybercrime

Larchenko M. V., Kucherov M. M.

89–94

Full structure security estimation system

Politov M. S., Melnikov A. V.

95–97

The automated system of monitoring on base of networks TCP/IP

Melnikov M. I.

98–100

Elaborations of defensive filter for covert channel’s counteraction in the data packets nets

Lihodedova G. N., Orehova A. A., Dementeev A. I.

101–103

Application of artificial neural networks in systems of attacks detection

Kryzhanovskiy A. V.

104–105

The architecture of software for authorship attribution techniques research

Romanov A. S.

106–109

Genetic algorithms using on optimizations problems

Avdeev A. A.

110–111

Construction Features of Modern Information Security Management Systems

Kovalev D. O., Miloslavskaya N. G.

112–113

Hardware of the control over carrying out of audit of information safety

Dzyuin S. V., Muhin K. V.

114–115

Description methodology of corporate information system for information security risk managment proñedure

Nechunaev V. M.

116–117

Imitating modeling of message system the transfer using a variation of routes

Melnichenko P. A., Shelupanov A. A.

118–120

Information safety modeling crucial objects

Chehonin K. A., Shevdyakov L. A., Krat Yu. G., Rybkina O. V.

121–122

Model assessing the effectiveness of countermeasures to threats information security with the use of hidden Markov processes

Erohin S. S.

123–124

Fuzzy models in system of protection of the information containing tax secret

Pivkin E. N., Belov V. M.

125–127

The Perspectives of Multicriteria Optimization Use in IT-security Control

Moskvin D. A., Kalinin M. O.

128–129

Global optimization method classification on security problems solution

Gazizov T. T.

130–131

Description of iliegal actions structurization in sphere of the computer information as their criminal research methodological basis

Skryl S. V., Belov E. B., Mescheryakov R. V.

132–134

Principles of influence mechanisms modelling nocuous programs on the protected information systems in interests of threats estimation of their safety

Avsentiev O. S., Aleksandrov V. V., Ryabinin G. I., Skryl S. V., Mescheryakov R. V.

135–136

Technique is professional-psychological selection of candidates on a post of the expert on information protection

Zyryanova T. Yu., Cherdantseva E. V.

137–138

Realization of a personnel component of policy of maintenance of information safety in certification of civil servants on the basis of semantic networks

Kaynina L. L.

139–143

Activity concepts on information protection

Finko V. N., Kiselev V. V., Dzhogan V. K., Sherstobitov V. V., Belov E. B., Shelupanov A. A.

144–146

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates