Use test phase formation noise signals in systems of protection of the information
Dzyuin S. V., Muhin K. V.
|
7–8
|
Noise generator with tuning ranges
Urbanovich P. V.
|
9–11
|
Evaluation of side electromagnetic radiation of electronic devices
Shelupanov A. A., Zaytsev A. P.
|
12–17
|
Information safety of objects of district: the automated materials decoding of space shooting
Smetanin A. M.
|
18–19
|
Multifunctional laboratory stand with variable electric circuit based on EPLD
Hanov V. H., Shahmatov A. V.
|
20–21
|
Physical protection systems modeling
Vergeychik A. V., Kushnir V. P.
|
22–23
|
Pulse self-adjusted watching systems
Beynarovich V. A.
|
24–27
|
To optimization of a choice of capacity of a shuttertransistors KMDP of gates
Torgonskiy L. A.
|
28–29
|
Fuzzy biometric data prevents implementation of biometric technologies in cryptography
Kosolapov D. O., Harin E. A., Goncharov S. M., Kornyushin P. N.
|
30–31
|
Problem of creation of the safe software and the offers under its decision
Zhidkov I. V., Fedorets O. N.
|
32–33
|
Localization of automobile numbers by a method of splitting of the image on blocks
Ochakovskiy D. O., Elizarov A. I.
|
34–39
|
Non-parametric statistic method application on picture identification problem
Gubanov N. Yu., Kalayda V. T.
|
40–42
|
New approaches to software-technical protection of network publications
Barilnik S. S., Gerasimov N. E., Minin I. V., Minin O. V.
|
43–46
|
Some approaches to a choice of parameters of a voice for an estimation of the validity of the statement
Mescheryakov R. V., Konev A. A., Yudin A. I.
|
47–50
|
This article describes three multilinear based cryptosystems
Kosolapov D. O., Harin E. A., Goncharov S. M., Kornyushin P. N.
|
51–53
|
Global optimization problems associated with cryptographic analysis of asymmetric ciphers
Dulkeyt V. I., Fayzullin R. T., Hnykin I. G.
|
54–55
|
The statistical analysis of stream ciphers
Igonichkina E. V.
|
56–57
|
Communication channel modeling method on splash randomize process theory base
Dzyuin S. V., Bekmachev A. E., Muhin K. V.
|
58–60
|
Ideal stegographic systems
Ryabko B. Ya., Fionov A. N.
|
61–62
|
Stegoanalyze graphic data in various formats
Zhilkin M. Yu.
|
63–64
|
The calculating entropy the system on the basis of simulation dynamics a subjects for method Monte-Carlo
Filimonov Yu. M.
|
65–66
|
Approaches to designing protected archives based on secret division
Kruchinin V. V., Shelupanov A. A.
|
67–72
|
Struggle with insiders attacks: the system approach
Epifantsev B. N.
|
73–74
|
The structure of protection system software for the workplace processing personal medical data
Zykov V. D.
|
75–77
|
Self-propagating viruses detection and neutralization methods
Bulahov N. G., Kalayda V. T.
|
78–82
|
Structure symbol recognitions method review
Afonasenko A. V., Elizarov A. I.
|
83–88
|
Universal identification – the important means of struggle with cybercrime
Larchenko M. V., Kucherov M. M.
|
89–94
|
Full structure security estimation system
Politov M. S., Melnikov A. V.
|
95–97
|
The automated system of monitoring on base of networks TCP/IP
Melnikov M. I.
|
98–100
|
Elaborations of defensive filter for covert channel’s counteraction in the data packets nets
Lihodedova G. N., Orehova A. A., Dementeev A. I.
|
101–103
|
Application of artificial neural networks in systems of attacks detection
Kryzhanovskiy A. V.
|
104–105
|
The architecture of software for authorship attribution techniques research
Romanov A. S.
|
106–109
|
Genetic algorithms using on optimizations problems
Avdeev A. A.
|
110–111
|
Construction Features of Modern Information Security Management Systems
Kovalev D. O., Miloslavskaya N. G.
|
112–113
|
Hardware of the control over carrying out of audit of information safety
Dzyuin S. V., Muhin K. V.
|
114–115
|
Description methodology of corporate information system for information security risk managment proñedure
Nechunaev V. M.
|
116–117
|
Imitating modeling of message system the transfer using a variation of routes
Melnichenko P. A., Shelupanov A. A.
|
118–120
|
Information safety modeling crucial objects
Chehonin K. A., Shevdyakov L. A., Krat Yu. G., Rybkina O. V.
|
121–122
|
Model assessing the effectiveness of countermeasures to threats information security with the use of hidden Markov processes
Erohin S. S.
|
123–124
|
Fuzzy models in system of protection of the information containing tax secret
Pivkin E. N., Belov V. M.
|
125–127
|
The Perspectives of Multicriteria Optimization Use in IT-security Control
Moskvin D. A., Kalinin M. O.
|
128–129
|
Global optimization method classification on security problems solution
Gazizov T. T.
|
130–131
|
Description of iliegal actions structurization in sphere of the computer information as their criminal research methodological basis
Skryl S. V., Belov E. B., Mescheryakov R. V.
|
132–134
|
Principles of influence mechanisms modelling nocuous programs on the protected information systems in interests of threats estimation of their safety
Avsentiev O. S., Aleksandrov V. V., Ryabinin G. I., Skryl S. V., Mescheryakov R. V.
|
135–136
|
Technique is professional-psychological selection of candidates on a post of the expert on information protection
Zyryanova T. Yu., Cherdantseva E. V.
|
137–138
|
Realization of a personnel component of policy of maintenance of information safety in certification of civil servants on the basis of semantic networks
Kaynina L. L.
|
139–143
|
Activity concepts on information protection
Finko V. N., Kiselev V. V., Dzhogan V. K., Sherstobitov V. V., Belov E. B., Shelupanov A. A.
|
144–146
|