Quarterly journal published in SPbPU
and edited by prof. Dmitry Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2025 year
  • 2024 year
  • 2023 year
  • 2022 year
  • 2021 year
  • 2020 year
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
  • 2005 year
  • 2004 year
  • 2003 year
    • № 1 2003
      • СОВРЕМЕННОЕ СОСТОЯНИЕ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ КОМПЬЮТЕРНЫХ СИСТЕМ

        Tarasov А. А.

        Strategy of maintenance of functional stability of computer systems

        To quote:

        Tarasov А. А.

        Strategy of maintenance of functional stability of computer systems // Information Security Problems. Computer Systems. 2003. № 1. DOI:
      • INFORMATION SECURITY APPLICATION

        Otavin A. D.

        Forced workstation software loading as a method to support of information safety of working environment

        To quote:

        Otavin A. D.

        Forced workstation software loading as a method to support of information safety of working environment // Information Security Problems. Computer Systems. 2003. № 1. DOI:
      • TECHNICAL SOLUTION

        Kryachko A. F., Makarov S. B.

        The method of information defence on the basis of polarized effects for remote communication systems

        To quote:

        Kryachko A. F., Makarov S. B.

        The method of information defence on the basis of polarized effects for remote communication systems // Information Security Problems. Computer Systems. 2003. № 1. DOI:

        Vorobyev E. G., Makarov S. B.

        Reticence of the information transmitting in a modern digital communication systems

        To quote:

        Vorobyev E. G., Makarov S. B.

        Reticence of the information transmitting in a modern digital communication systems // Information Security Problems. Computer Systems. 2003. № 1. DOI:
      • ЗАЩИЩЁННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ

        Kalinin M. O.

        Automatic state analysis of the Windows 2000 operationg system

        To quote:

        Kalinin M. O.

        Automatic state analysis of the Windows 2000 operationg system // Information Security Problems. Computer Systems. 2003. № 1. DOI:

        Zegzhda D. P., Kalinin M. O.

        Testing the Fenix secure operating system for conformance to the POSIX.1 standard

        To quote:

        Zegzhda D. P., Kalinin M. O.

        Testing the Fenix secure operating system for conformance to the POSIX.1 standard // Information Security Problems. Computer Systems. 2003. № 1. DOI:
      • БЕЗОПАСНОСТЬ РАСПРЕДЕЛЁННЫХ СИСТЕМ И ТЕЛЕКОММУНИКАЦИЙ

        Platonov V. V.

        FIPA agent system security analysis

        To quote:

        Platonov V. V.

        FIPA agent system security analysis // Information Security Problems. Computer Systems. 2003. № 1. DOI:
      • APPLIED CRYPTOGRAPHY

        Maltsev G. N., Shtanko S. V.

        Authentication and information security protocols based on asymmetric cryptoalgorithms

        To quote:

        Maltsev G. N., Shtanko S. V.

        Authentication and information security protocols based on asymmetric cryptoalgorithms // Information Security Problems. Computer Systems. 2003. № 1. DOI:

        Plekhanov V. G.

        Quantum information and its defence

        To quote:

        Plekhanov V. G.

        Quantum information and its defence // Information Security Problems. Computer Systems. 2003. № 1. DOI:

        Rostovtsev A. G., Makhovenko E. B.

        Elliptic curve signcryption: security analysis and secure implementation

        To quote:

        Rostovtsev A. G., Makhovenko E. B.

        Elliptic curve signcryption: security analysis and secure implementation // Information Security Problems. Computer Systems. 2003. № 1. DOI:
      • ASPECTS OF INFORMATION SECURITY

        Smirnova O. A.

        Security of reproduction of urban housing fund – as aspect of information security

        To quote:

        Smirnova O. A.

        Security of reproduction of urban housing fund – as aspect of information security // Information Security Problems. Computer Systems. 2003. № 1. DOI:
    • № 2 2003
      • FUNDAMENTAL THEORY OF INFORMATION CONFRONTATION

        Manoilo A. V., Frolov D. B.

        Secret information and psychology operations as form of realization of information war’s conception

        To quote:

        Manoilo A. V., Frolov D. B.

        Secret information and psychology operations as form of realization of information war’s conception // Information Security Problems. Computer Systems. 2003. № 2. Pp. 7-14. DOI:

        Pages:

        7-14
      • INFORMATION SECURITY APPLICATION

        Bushuev L. V.

        Protecting user mail box from the unneccessary mail offers

        To quote:

        Bushuev L. V.

        Protecting user mail box from the unneccessary mail offers // Information Security Problems. Computer Systems. 2003. № 2. Pp. 15-21. DOI:

        Pages:

        15-21

        Makhovenko E. B., Rostovtsev A. G.

        Calculus approach to security analysis

        To quote:

        Makhovenko E. B., Rostovtsev A. G.

        Calculus approach to security analysis // Information Security Problems. Computer Systems. 2003. № 2. Pp. 22-29. DOI:

        Pages:

        22-29
      • TECHNICAL SOLUTION

        Vorobyev E. G., Makarov S. B.

        The use of the polarization signals propertiesw for increasing of radio communication systems information defense level

        To quote:

        Vorobyev E. G., Makarov S. B.

        The use of the polarization signals propertiesw for increasing of radio communication systems information defense level // Information Security Problems. Computer Systems. 2003. № 2. Pp. 30-37. DOI:

        Pages:

        30-37

        Merkusheva A. V.

        Scrambling method for preliminary transformation and interpretation of voice signal during maintenance of information safety

        To quote:

        Merkusheva A. V.

        Scrambling method for preliminary transformation and interpretation of voice signal during maintenance of information safety // Information Security Problems. Computer Systems. 2003. № 2. Pp. 38-49. DOI:

        Pages:

        38-49
      • ЗАЩИЩЁННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ

        Otavin A. D.

        Tools of the remote loading of workstations in the Phoenix operation system

        To quote:

        Otavin A. D.

        Tools of the remote loading of workstations in the Phoenix operation system // Information Security Problems. Computer Systems. 2003. № 2. Pp. 50-56. DOI:

        Pages:

        50-56
      • БЕЗОПАСНОСТЬ РАСПРЕДЕЛЁННЫХ СИСТЕМ И ТЕЛЕКОММУНИКАЦИЙ

        Zhoulkov E. V., Tomilin V. N.

        Network intrusion detection system vulnerabilities testing

        To quote:

        Zhoulkov E. V., Tomilin V. N.

        Network intrusion detection system vulnerabilities testing // Information Security Problems. Computer Systems. 2003. № 2. Pp. 57-64. DOI:

        Pages:

        57-64
      • APPLIED CRYPTOGRAPHY

        Shtanko S. V.

        Elliptic curves in cryptography

        To quote:

        Shtanko S. V.

        Elliptic curves in cryptography // Information Security Problems. Computer Systems. 2003. № 2. Pp. 65-74. DOI:

        Pages:

        65-74

        Rostovtsev A. G., Makhovenko E. B., Filippov A. S., Chechulin A. A.

        On the strength of GOST 28147–89

        To quote:

        Rostovtsev A. G., Makhovenko E. B., Filippov A. S., Chechulin A. A.

        On the strength of GOST 28147–89 // Information Security Problems. Computer Systems. 2003. № 2. Pp. 75-83. DOI:

        Pages:

        75-83

        Saveliev M. F.

        Protective transmission of messages for the unprotected channel

        To quote:

        Saveliev M. F.

        Protective transmission of messages for the unprotected channel // Information Security Problems. Computer Systems. 2003. № 2. Pp. 84-85. DOI:

        Pages:

        84-85

        Saveliev M. F.

        The transmision rate of information in the systems of radio communication with the code noiseing

        To quote:

        Saveliev M. F.

        The transmision rate of information in the systems of radio communication with the code noiseing // Information Security Problems. Computer Systems. 2003. № 2. Pp. 86-87. DOI:

        Pages:

        86-87

        Saveliev M. F.

        The estimation of the success wiretap probability for the code noise channels

        To quote:

        Saveliev M. F.

        The estimation of the success wiretap probability for the code noise channels // Information Security Problems. Computer Systems. 2003. № 2. Pp. 88-91. DOI:

        Pages:

        88-91
    • № 3 2003
      • INFORMATION SECURITY ASPECTS

        Zegzhda D. P.

        Security modelling

        To quote:

        Zegzhda D. P.

        Security modelling // Information Security Problems. Computer Systems. 2003. № 3. DOI:

        Buinevich M. V., Klyakhin V. N.

        The essence and content of the information protection conception during the scientific investigation

        To quote:

        Buinevich M. V., Klyakhin V. N.

        The essence and content of the information protection conception during the scientific investigation // Information Security Problems. Computer Systems. 2003. № 3. DOI:
      • FUNDAMENTAL THEORY OF INFORMATION CONFRONTATION

        Manoilo A. V., Frolov D. B.

        The social and political attitudes system of modern information society as environment for secret information and psychology operations

        To quote:

        Manoilo A. V., Frolov D. B.

        The social and political attitudes system of modern information society as environment for secret information and psychology operations // Information Security Problems. Computer Systems. 2003. № 3. DOI:
      • INFORMATION SECURITY APPLICATION

        Kort S. S., Rudina E. A.

        A method of intrusion development dynamics evaluation

        To quote:

        Kort S. S., Rudina E. A.

        A method of intrusion development dynamics evaluation // Information Security Problems. Computer Systems. 2003. № 3. DOI:

        Ovtchinnikova E. V.

        Intrusion modelling

        To quote:

        Ovtchinnikova E. V.

        Intrusion modelling // Information Security Problems. Computer Systems. 2003. № 3. DOI:
      • TECHNICAL SOLUTION

        Portnjagin N. N.

        Increase of reliability and information safety of ship information system methods of technical diagnostics

        To quote:

        Portnjagin N. N.

        Increase of reliability and information safety of ship information system methods of technical diagnostics // Information Security Problems. Computer Systems. 2003. № 3. DOI:
      • ЗАЩИЩЁННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ

        Kalinin M. O.

        A flexible access control in Linux

        To quote:

        Kalinin M. O.

        A flexible access control in Linux // Information Security Problems. Computer Systems. 2003. № 3. DOI:

        Vovk A.

        OS emulation

        To quote:

        Vovk A.

        OS emulation // Information Security Problems. Computer Systems. 2003. № 3. DOI:
      • БЕЗОПАСНОСТЬ РАСПРЕДЕЛЁННЫХ СИСТЕМ И ТЕЛЕКОММУНИКАЦИЙ

        Nekrasova T. P., Aksenova E. E.

        Planning of in telecommunication infrastructure

        To quote:

        Nekrasova T. P., Aksenova E. E.

        Planning of in telecommunication infrastructure // Information Security Problems. Computer Systems. 2003. № 3. DOI:
      • APPLIED CRYPTOGRAPHY

        Rostovtsev A. G., Shemyakina O. V.

        On factoring primes in imaginary quadratic orders

        To quote:

        Rostovtsev A. G., Shemyakina O. V.

        On factoring primes in imaginary quadratic orders // Information Security Problems. Computer Systems. 2003. № 3. DOI:

        Kuritsyn K. A.

        Security of quantum key distribution protocols with interactive reconciliation

        To quote:

        Kuritsyn K. A.

        Security of quantum key distribution protocols with interactive reconciliation // Information Security Problems. Computer Systems. 2003. № 3. DOI:
    • № 4 2003
      • ТЕОРЕТИЧЕСКИЕ ОСНОВЫ ИНФОРМАЦИОННОЙ БЕЗОПАCНОСТИ

        Kornienko A. A., Kotenko A. G.

        The method of constructing the information security risk assessment model

        To quote:

        Kornienko A. A., Kotenko A. G.

        The method of constructing the information security risk assessment model // Information Security Problems. Computer Systems. 2003. № 4. DOI:

        Ovchinnikova E. V.

        Generalized model of intrusion detection systems

        To quote:

        Ovchinnikova E. V.

        Generalized model of intrusion detection systems // Information Security Problems. Computer Systems. 2003. № 4. DOI:
      • INFORMATION SECURITY APPLICATION

        Buinevitch M., Klaykhin V.

        One of the methods to determine the composition of technical means in the information protection system

        To quote:

        Buinevitch M., Klaykhin V.

        One of the methods to determine the composition of technical means in the information protection system // Information Security Problems. Computer Systems. 2003. № 4. DOI:

        Sorokin V. N.

        Digital signature application for protecting against malicious loadable kernel modules

        To quote:

        Sorokin V. N.

        Digital signature application for protecting against malicious loadable kernel modules // Information Security Problems. Computer Systems. 2003. № 4. DOI:

        Monin A. S.

        Evaluation of tools for source code analysis

        To quote:

        Monin A. S.

        Evaluation of tools for source code analysis // Information Security Problems. Computer Systems. 2003. № 4. DOI:

        Bushuev L. V.

        Ciphered links in database

        To quote:

        Bushuev L. V.

        Ciphered links in database // Information Security Problems. Computer Systems. 2003. № 4. DOI:
      • ЗАЩИЩЁННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ

        Zegzhda D. P.

        Integration of the native security systems and foreign applications using the hybrid operating systems technology

        To quote:

        Zegzhda D. P.

        Integration of the native security systems and foreign applications using the hybrid operating systems technology // Information Security Problems. Computer Systems. 2003. № 4. DOI:
      • БЕЗОПАСНОСТЬ РАСПРЕДЕЛЁННЫХ СИСТЕМ И ТЕЛЕКОММУНИКАЦИЙ

        Baranov P. A.

        The specification of the network traffic analyser based on the expert system approach applying to intrusion detection

        To quote:

        Baranov P. A.

        The specification of the network traffic analyser based on the expert system approach applying to intrusion detection // Information Security Problems. Computer Systems. 2003. № 4. DOI:

        Baranov P. A.

        The architecture development of the network traffic analyser based on the expert system approach applying to intrusion detection

        To quote:

        Baranov P. A.

        The architecture development of the network traffic analyser based on the expert system approach applying to intrusion detection // Information Security Problems. Computer Systems. 2003. № 4. DOI:

        Kort S. S., Rudina E. A.

        Evaluation of sequrety of remote hosts requests based on signature-based intrusion detection systems dat

        To quote:

        Kort S. S., Rudina E. A.

        Evaluation of sequrety of remote hosts requests based on signature-based intrusion detection systems dat // Information Security Problems. Computer Systems. 2003. № 4. DOI:

        Sichev A. M.

        Methods of firewall structure and functional formition based on security profile

        To quote:

        Sichev A. M.

        Methods of firewall structure and functional formition based on security profile // Information Security Problems. Computer Systems. 2003. № 4. DOI:
      • APPLIED CRYPTOGRAPHY

        Kapralov М., Okov I.

        Achievability of joint coding with loss signals in information security tasks

        To quote:

        Kapralov М., Okov I.

        Achievability of joint coding with loss signals in information security tasks // Information Security Problems. Computer Systems. 2003. № 4. DOI:
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year