List of articles

Electronics, measurement technology, radio engineering and communications

Comparison of the accuracy of estimating the delay time of navigation signals by means of using different models of tropospheric refractivity profile

Zaharov F. N., Krutikov M. V.

7–12

Distortion analysis of various form short-pulse signal in UWB current-voltage and capacitance-voltage characteristics measuring system

Otuzbaeva D. K., Semenov E. V.

13–17

The dynamic range and the number of brightness gradations of highly sensitive image sensors

Kirpichenko Yu. R.

18–21

The dependence of image intensifier screen brightness on the electric potential on its electrodes

Kirpichenko Yu. R.

22–24

Management, computer science and informatics

Organizational and technical and legal support of safety infocommunication systems of objects «critical infrastructure» in the Russian Federation

Avsentiev O. S., Babkin A. N., Babkin S. A.

27–32

On some characteristics of Boolean functions without prohibition of four variables in connection with the construction of bijective mappings of a special type

Rozhkov M. I.

33–39

The method for increasing the efficiency of unknown type intrusion detection by introducing false targets in the network

Aleynov Yu. V.

40–43

Structuring agent-based set of corporate information security assessment systems

Varlataya S. K., Moskalenko Yu. S., Shiryaev S. V.

44–46

Generic Model of Security Threats for Personal Data in regard of Information Systems Dedicated to Academic Planning

Gazizov T. T., Mytnik A. A., Butakov A. N.

47–50

Construction of neural network transformer «Biometrics – access code» based on the parameters of the visual evoked potential electroencephalogram

Goncharov S. M., Borshevnikov A. E.

51–55

Analysis of results of audit of system of information security with application of a complex comparative assessment

Danilova O. T., Shirokov E. V.

56–59

Basic approaches to the use of mathematical apparatus of cellular automata theory for the tasks of encoding information

Evsyutin O. O., Shelupanov A. A.

60–65

Stability of the objective decision of experts at influence of threats on blocking of information in decision- making systems with experts

Efremov B. I., Fayzullin R. T.

66–70

Research of methods and instruments for searching entry in encrypted data

Zharinov R. F.

71–76

Information security incidents assessment

Zefirov S. L., Scherbakova A. Yu.

77–81

Engineering of imitation model of a complex network of security systems

Ishakov S. Yu., Shelupanov A. A., Ishakov A. Yu.

82–86

About model of a speech signal at an assessment of security of speech information by leaking from technical channels

Ivanov A. V., Trushin V. A.

87–90

Development of requirements for safety assessment virtual infrastructure

Kurnosov K. V., Selifanov V. V.

91–97

The study of information characteristics transformations substitution and permutation

Los A. B.

98–104

Information system analysis barely visible texture of the iris in the visible range

Minakova N. N., Petrov I. V.

105–107

Formation of requirements when designing a system to protect confidential information

Mironova V. G., Belov E. B., Kraynov A. Yu.

108–111

Threats to information security of confidential information in different contexts of information systems for handling confidential information

Mironova V. G., Bondarchuk S. S., Timchenko S. V.

112–115

The methodology for the analysis of modes of differentiation of user access rights to confidential information and the possibility of unauthorized access

Mironova V. G., Yugov N. T., Mitsel A. A.

116–120

Assessing the influence of information security threats to the availability of telecommunications network

Ringenblyum P. G.

121–124

The immunity of the radio electronic system under impact of destabilizing electromagnetic field

Mitrohin V. E., Ryapolov A. V.

125–129

Methodological aspects of data protection with the use of resources multiservice networks

Novikov S. N.

130–136

Multicriterial assessment of the level of vulnerability of the objects of informatization

Noskov S. I., Butin A. A., Sokolova L. E.

137–142

Ensuring safe operation of multiservice network in transport industry

Nyrkov A. P., Sokolov S. S., Belousov A. S., Kovalnogova N. M., Maltsev V. A.

143–149

Analysis of information security aspects based on the formal models of business processes

Pestunova T. M., Rodionova Z. V., Gorinova S. M.

150–156

On the issue of the analysis of the security of objects of informatization using neural networks

Pivkin E. N., Belov V. M., Belkin S. A.

157–161

Means of committing computercrimes

Polyakov V. V., Lapin S. A.

162–166

Risk assessment methodology violations of information security with regard to the qualifications of Experts

Pomortsev A. S.

167–169

Develop a system for risk assessment of information security violations organizations

Pomortsev A. S., Novikov S. N.

170–174

Procedure of the delayed reception of the message in a problem of protection of production from falsification

Rusetskiy V. S., Rusetskaya E. A., Fayzullin R. T., Fayzullin R. R.

175–179

On problem of user identification reliability for remote electronic interaction

Sabanov A. G.

180–183

Recognition of rival's strategy using actions detection

Tokarev V. L.

184–187

Opportunities of depersonalization personal data in systems using relational databases

Trifonova Yu. V., Zharinov R. F.

188–194

A scheme for the implementation of parallel computing as a protection mechanism of processed data

Fayzullin R. T., Scherba E. V., Volkov D. A.

195–201

Intrusion detection using an ensembles of decision trees

Hodashinskiy I. A., Del V. A., Anfilofiev A. E.

202–206

Evaluation of the possibility of detection side compromising electromagnetic emanations video PC

Horev A. A.

207–213

The common model of intrusion detection system

Burlakov M. E.

214–218

«Brain-computer interface» as new technology of control and information transfer

Goncharov S. M., Markin M. E.

215–256

The authentication system based on dynamic handwritten signature

Doroshenko T. Yu., Kostyuchenko K. Yu.

219–223

Method for software selection on the basis of Choquet integral and imperialist algorithm

Ahaev A. V., Hodashinskiy I. A., Anfilofiev A. E.

224–229

Retrieving of the total carbon dioxide by using an empirical orthogonal functions from satellite data

Kataev M. Yu., Lukyanov A. K.

230–237

Architecture of lossless data exchange in pear-to-pear web application of videoconference

Saveliev A. I., Prischepa M. V.

238–245

The method of digital fingerprinting for static images based on weighted Hamming metric and on weighted container model

Bezzateev S. V., Voloshina N. V., Zhidanov K. A.

246–251

The modern technology of insurance funds documentation

Proskuryakov N. E., Borzenkova S. Yu., Evseev E. E., Chechuga O. V.

257–265

Plagiarism detection and text homogeneity checking technique based on one-class support machine and fast correlation-based filter

Romanov A. S., Mescheryakov R. V., Rezanova Z. I.

264–269

Adaptive identification and interpretation of non-stationary well test gas fields

Sergeev V. L., Gavrilov K. S.

270–275

Using GIS technologies for monitoring and evaluating the effects of emergencies

Shishkin I. N., Skugarev A. N.

276–280

Self-organizing network for operational information cooperation for the needs of the population and special purposes

Melnikov M. I., Kovtun A. S.

281–286

Network technologies for on-board systems spacecraft: development experience

Hanov V. H.

287–293

Formation approaches to assessing the economic security of the economic entity

Golovanova N. B.

294–300

Electrical engineering

The control system by frequency of drive rotation construction

Gavrish P. E., Mihalchenko G. Ya.

303–307

Future Development of Hysteresis Synchronous Electrical Machine Mechatronic Systems

Padalko D. A., Chervatyuk A. V.

308–314

The importance of establishing and applying the thermal control system of traction induction motors

Goldovskaya A. A., Dorohina E. S., Rapoport O. L., Aslanyan R. O.

315–318

Single phase induction motor

Kachin O. S., Kachin S. I., Kiselev A. V., Serov A. B.

319–323

Messages

On Developing Professional Standards in Information Security

Belov E. B., Los V. P.

327–331

Financial risk analysis in planning research and development at university

Zhuravleva N. L.

332–335

Editorial office address

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 701-582

  journal@tusur.ru

 

Viktor N. Maslennikov

Executive Secretary of the Editor’s Office

 Editor’s Office: 40 Lenina Prospect, Tomsk, 634050, Russia

  Phone / Fax: + 7 (3822) 51-21-21 / 51-43-02

  vnmas@tusur.ru

Subscription for updates