Organizational and technical and legal support of safety infocommunication systems of objects «critical infrastructure» in the Russian Federation
Avsentiev O. S., Babkin A. N., Babkin S. A.
|
27–32
|
On some characteristics of Boolean functions without prohibition of four variables in connection with the construction of bijective mappings of a special type
Rozhkov M. I.
|
33–39
|
The method for increasing the efficiency of unknown type intrusion detection by introducing false targets in the network
Aleynov Yu. V.
|
40–43
|
Structuring agent-based set of corporate information security assessment systems
Varlataya S. K., Moskalenko Yu. S., Shiryaev S. V.
|
44–46
|
Generic Model of Security Threats for Personal Data in regard of Information Systems Dedicated to Academic Planning
Gazizov T. T., Mytnik A. A., Butakov A. N.
|
47–50
|
Construction of neural network transformer «Biometrics – access code» based on the parameters of the visual evoked potential electroencephalogram
Goncharov S. M., Borshevnikov A. E.
|
51–55
|
Analysis of results of audit of system of information security with application of a complex comparative assessment
Danilova O. T., Shirokov E. V.
|
56–59
|
Basic approaches to the use of mathematical apparatus of cellular automata theory for the tasks of encoding information
Evsyutin O. O., Shelupanov A. A.
|
60–65
|
Stability of the objective decision of experts at influence of threats on blocking of information in decision- making systems with experts
Efremov B. I., Fayzullin R. T.
|
66–70
|
Research of methods and instruments for searching entry in encrypted data
Zharinov R. F.
|
71–76
|
Information security incidents assessment
Zefirov S. L., Scherbakova A. Yu.
|
77–81
|
Engineering of imitation model of a complex network of security systems
Ishakov S. Yu., Shelupanov A. A., Ishakov A. Yu.
|
82–86
|
About model of a speech signal at an assessment of security of speech information by leaking from technical channels
Ivanov A. V., Trushin V. A.
|
87–90
|
Development of requirements for safety assessment virtual infrastructure
Kurnosov K. V., Selifanov V. V.
|
91–97
|
The study of information characteristics transformations substitution and permutation
Los A. B.
|
98–104
|
Information system analysis barely visible texture of the iris in the visible range
Minakova N. N., Petrov I. V.
|
105–107
|
Formation of requirements when designing a system to protect confidential information
Mironova V. G., Belov E. B., Kraynov A. Yu.
|
108–111
|
Threats to information security of confidential information in different contexts of information systems for handling confidential information
Mironova V. G., Bondarchuk S. S., Timchenko S. V.
|
112–115
|
The methodology for the analysis of modes of differentiation of user access rights to confidential information and the possibility of unauthorized access
Mironova V. G., Yugov N. T., Mitsel A. A.
|
116–120
|
Assessing the influence of information security threats to the availability of telecommunications network
Ringenblyum P. G.
|
121–124
|
The immunity of the radio electronic system under impact of destabilizing electromagnetic field
Mitrohin V. E., Ryapolov A. V.
|
125–129
|
Methodological aspects of data protection with the use of resources multiservice networks
Novikov S. N.
|
130–136
|
Multicriterial assessment of the level of vulnerability of the objects of informatization
Noskov S. I., Butin A. A., Sokolova L. E.
|
137–142
|
Ensuring safe operation of multiservice network in transport industry
Nyrkov A. P., Sokolov S. S., Belousov A. S., Kovalnogova N. M., Maltsev V. A.
|
143–149
|
Analysis of information security aspects based on the formal models of business processes
Pestunova T. M., Rodionova Z. V., Gorinova S. M.
|
150–156
|
On the issue of the analysis of the security of objects of informatization using neural networks
Pivkin E. N., Belov V. M., Belkin S. A.
|
157–161
|
Means of committing computercrimes
Polyakov V. V., Lapin S. A.
|
162–166
|
Risk assessment methodology violations of information security with regard to the qualifications of Experts
Pomortsev A. S.
|
167–169
|
Develop a system for risk assessment of information security violations organizations
Pomortsev A. S., Novikov S. N.
|
170–174
|
Procedure of the delayed reception of the message in a problem of protection of production from falsification
Rusetskiy V. S., Rusetskaya E. A., Fayzullin R. T., Fayzullin R. R.
|
175–179
|
On problem of user identification reliability for remote electronic interaction
Sabanov A. G.
|
180–183
|
Recognition of rival's strategy using actions detection
Tokarev V. L.
|
184–187
|
Opportunities of depersonalization personal data in systems using relational databases
Trifonova Yu. V., Zharinov R. F.
|
188–194
|
A scheme for the implementation of parallel computing as a protection mechanism of processed data
Fayzullin R. T., Scherba E. V., Volkov D. A.
|
195–201
|
Intrusion detection using an ensembles of decision trees
Hodashinskiy I. A., Del V. A., Anfilofiev A. E.
|
202–206
|
Evaluation of the possibility of detection side compromising electromagnetic emanations video PC
Horev A. A.
|
207–213
|
The common model of intrusion detection system
Burlakov M. E.
|
214–218
|
«Brain-computer interface» as new technology of control and information transfer
Goncharov S. M., Markin M. E.
|
215–256
|
The authentication system based on dynamic handwritten signature
Doroshenko T. Yu., Kostyuchenko K. Yu.
|
219–223
|
Method for software selection on the basis of Choquet integral and imperialist algorithm
Ahaev A. V., Hodashinskiy I. A., Anfilofiev A. E.
|
224–229
|
Retrieving of the total carbon dioxide by using an empirical orthogonal functions from satellite data
Kataev M. Yu., Lukyanov A. K.
|
230–237
|
Architecture of lossless data exchange in pear-to-pear web application of videoconference
Saveliev A. I., Prischepa M. V.
|
238–245
|
The method of digital fingerprinting for static images based on weighted Hamming metric and on weighted container model
Bezzateev S. V., Voloshina N. V., Zhidanov K. A.
|
246–251
|
The modern technology of insurance funds documentation
Proskuryakov N. E., Borzenkova S. Yu., Evseev E. E., Chechuga O. V.
|
257–265
|
Plagiarism detection and text homogeneity checking technique based on one-class support machine and fast correlation-based filter
Romanov A. S., Mescheryakov R. V., Rezanova Z. I.
|
264–269
|
Adaptive identification and interpretation of non-stationary well test gas fields
Sergeev V. L., Gavrilov K. S.
|
270–275
|
Using GIS technologies for monitoring and evaluating the effects of emergencies
Shishkin I. N., Skugarev A. N.
|
276–280
|
Self-organizing network for operational information cooperation for the needs of the population and special purposes
Melnikov M. I., Kovtun A. S.
|
281–286
|
Network technologies for on-board systems spacecraft: development experience
Hanov V. H.
|
287–293
|
Formation approaches to assessing the economic security of the economic entity
Golovanova N. B.
|
294–300
|