List of articles
Electronics, radio engineering and communications
Management, computer science and informatics
Functional models of information protection against leakage due to spurious electromagnetic emissions of informatization objects
Avsentiev A. O., Krugov A. G., Perova Yu. P.
|
17–35
|
Mathematical model for selecting a contractor to assess information security risks
Koltays A. S., Shatrova A. A., Shelupanov A. A.
|
36–41
|
Providing security for complex systems based on influence detection in graph models
Tselyh A. N., Tselyh L. A., Vasiliev V. S.
|
42–49
|
Assessing the impact of obfuscation on the process of identifying the author of a program code
Kurtukova A. V., Svarovskaya E. E., Romanov A. S.
|
50–54
|
Motion trajectory planning for a multi-link manipulator in an unknown environment based on ant colony optimization
Goritov A. N., Goncharov K. V.
|
55–64
|
Hierarchical bitmap index modification to improve performance of database management systems
Borovskoy I. G., Harchenko I. K.
|
65–72
|
New approach to the assessment of portfolio long-term correlation
Barysheva A. E., Markov A. S., Mitsel A. A.
|
73–80
|
Tool system for analysis and evaluation of learning content
Gorodovich A. V., Krechetov I. A., Kruchinin V. V., Perminova M. Yu.
|
81–88
|
Determining the head position regarding the digital video camera installed on a computer
Kataev M. Yu., Mosyaev A. E.
|
89–94
|
Electrical engineering