List of articles
Electronics, radio engineering and communications
Management, computer science and informatics
|
Functional models of information protection against leakage due to spurious electromagnetic emissions of informatization objects
Avsentiev A. O., Krugov A. G., Perova Yu. P.
|
17–35
|
|
Mathematical model for selecting a contractor to assess information security risks
Koltays A. S., Shatrova A. A., Shelupanov A. A.
|
36–41
|
|
Providing security for complex systems based on influence detection in graph models
Tselyh A. N., Tselyh L. A., Vasiliev V. S.
|
42–49
|
|
Assessing the impact of obfuscation on the process of identifying the author of a program code
Kurtukova A. V., Svarovskaya E. E., Romanov A. S.
|
50–54
|
|
Motion trajectory planning for a multi-link manipulator in an unknown environment based on ant colony optimization
Goritov A. N., Goncharov K. V.
|
55–64
|
|
Hierarchical bitmap index modification to improve performance of database management systems
Borovskoy I. G., Harchenko I. K.
|
65–72
|
|
New approach to the assessment of portfolio long-term correlation
Barysheva A. E., Markov A. S., Mitsel A. A.
|
73–80
|
|
Tool system for analysis and evaluation of learning content
Gorodovich A. V., Krechetov I. A., Kruchinin V. V., Perminova M. Yu.
|
81–88
|
|
Determining the head position regarding the digital video camera installed on a computer
Kataev M. Yu., Mosyaev A. E.
|
89–94
|
Electrical engineering