Tarasov А. А.
To quote:
Tarasov А. А.
Strategy of maintenance of functional stability of computer systems // Information Security Problems. Computer Systems. 2003. № 1. DOI:Otavin A. D.
To quote:
Otavin A. D.
Forced workstation software loading as a method to support of information safety of working environment // Information Security Problems. Computer Systems. 2003. № 1. DOI:Kryachko A. F., Makarov S. B.
To quote:
Kryachko A. F., Makarov S. B.
The method of information defence on the basis of polarized effects for remote communication systems // Information Security Problems. Computer Systems. 2003. № 1. DOI:Vorobyev E. G., Makarov S. B.
To quote:
Vorobyev E. G., Makarov S. B.
Reticence of the information transmitting in a modern digital communication systems // Information Security Problems. Computer Systems. 2003. № 1. DOI:Kalinin M. O.
To quote:
Kalinin M. O.
Automatic state analysis of the Windows 2000 operationg system // Information Security Problems. Computer Systems. 2003. № 1. DOI:Zegzhda D. P., Kalinin M. O.
To quote:
Zegzhda D. P., Kalinin M. O.
Testing the Fenix secure operating system for conformance to the POSIX.1 standard // Information Security Problems. Computer Systems. 2003. № 1. DOI:Platonov V. V.
To quote:
Platonov V. V.
FIPA agent system security analysis // Information Security Problems. Computer Systems. 2003. № 1. DOI:Maltsev G. N., Shtanko S. V.
To quote:
Maltsev G. N., Shtanko S. V.
Authentication and information security protocols based on asymmetric cryptoalgorithms // Information Security Problems. Computer Systems. 2003. № 1. DOI:Plekhanov V. G.
To quote:
Plekhanov V. G.
Quantum information and its defence // Information Security Problems. Computer Systems. 2003. № 1. DOI:Rostovtsev A. G., Makhovenko E. B.
To quote:
Rostovtsev A. G., Makhovenko E. B.
Elliptic curve signcryption: security analysis and secure implementation // Information Security Problems. Computer Systems. 2003. № 1. DOI:Smirnova O. A.
To quote:
Smirnova O. A.
Security of reproduction of urban housing fund – as aspect of information security // Information Security Problems. Computer Systems. 2003. № 1. DOI:Manoilo A. V., Frolov D. B.
To quote:
Manoilo A. V., Frolov D. B.
Secret information and psychology operations as form of realization of information war’s conception // Information Security Problems. Computer Systems. 2003. № 2. Pp. 7-14. DOI:Pages:
7-14Bushuev L. V.
To quote:
Bushuev L. V.
Protecting user mail box from the unneccessary mail offers // Information Security Problems. Computer Systems. 2003. № 2. Pp. 15-21. DOI:Pages:
15-21Makhovenko E. B., Rostovtsev A. G.
To quote:
Makhovenko E. B., Rostovtsev A. G.
Calculus approach to security analysis // Information Security Problems. Computer Systems. 2003. № 2. Pp. 22-29. DOI:Pages:
22-29Vorobyev E. G., Makarov S. B.
To quote:
Vorobyev E. G., Makarov S. B.
The use of the polarization signals propertiesw for increasing of radio communication systems information defense level // Information Security Problems. Computer Systems. 2003. № 2. Pp. 30-37. DOI:Pages:
30-37Merkusheva A. V.
To quote:
Merkusheva A. V.
Scrambling method for preliminary transformation and interpretation of voice signal during maintenance of information safety // Information Security Problems. Computer Systems. 2003. № 2. Pp. 38-49. DOI:Pages:
38-49Otavin A. D.
To quote:
Otavin A. D.
Tools of the remote loading of workstations in the Phoenix operation system // Information Security Problems. Computer Systems. 2003. № 2. Pp. 50-56. DOI:Pages:
50-56Zhoulkov E. V., Tomilin V. N.
To quote:
Zhoulkov E. V., Tomilin V. N.
Network intrusion detection system vulnerabilities testing // Information Security Problems. Computer Systems. 2003. № 2. Pp. 57-64. DOI:Pages:
57-64Shtanko S. V.
To quote:
Shtanko S. V.
Elliptic curves in cryptography // Information Security Problems. Computer Systems. 2003. № 2. Pp. 65-74. DOI:Pages:
65-74Rostovtsev A. G., Makhovenko E. B., Filippov A. S., Chechulin A. A.
To quote:
Rostovtsev A. G., Makhovenko E. B., Filippov A. S., Chechulin A. A.
On the strength of GOST 28147–89 // Information Security Problems. Computer Systems. 2003. № 2. Pp. 75-83. DOI:Pages:
75-83Saveliev M. F.
To quote:
Saveliev M. F.
Protective transmission of messages for the unprotected channel // Information Security Problems. Computer Systems. 2003. № 2. Pp. 84-85. DOI:Pages:
84-85Saveliev M. F.
To quote:
Saveliev M. F.
The transmision rate of information in the systems of radio communication with the code noiseing // Information Security Problems. Computer Systems. 2003. № 2. Pp. 86-87. DOI:Pages:
86-87Saveliev M. F.
To quote:
Saveliev M. F.
The estimation of the success wiretap probability for the code noise channels // Information Security Problems. Computer Systems. 2003. № 2. Pp. 88-91. DOI:Pages:
88-91Zegzhda D. P.
To quote:
Zegzhda D. P.
Security modelling // Information Security Problems. Computer Systems. 2003. № 3. DOI:Buinevich M. V., Klyakhin V. N.
To quote:
Buinevich M. V., Klyakhin V. N.
The essence and content of the information protection conception during the scientific investigation // Information Security Problems. Computer Systems. 2003. № 3. DOI:Manoilo A. V., Frolov D. B.
To quote:
Manoilo A. V., Frolov D. B.
The social and political attitudes system of modern information society as environment for secret information and psychology operations // Information Security Problems. Computer Systems. 2003. № 3. DOI:Kort S. S., Rudina E. A.
To quote:
Kort S. S., Rudina E. A.
A method of intrusion development dynamics evaluation // Information Security Problems. Computer Systems. 2003. № 3. DOI:Ovtchinnikova E. V.
To quote:
Ovtchinnikova E. V.
Intrusion modelling // Information Security Problems. Computer Systems. 2003. № 3. DOI:Portnjagin N. N.
To quote:
Portnjagin N. N.
Increase of reliability and information safety of ship information system methods of technical diagnostics // Information Security Problems. Computer Systems. 2003. № 3. DOI:Kalinin M. O.
To quote:
Kalinin M. O.
A flexible access control in Linux // Information Security Problems. Computer Systems. 2003. № 3. DOI:Vovk A.
To quote:
Vovk A.
OS emulation // Information Security Problems. Computer Systems. 2003. № 3. DOI:Nekrasova T. P., Aksenova E. E.
To quote:
Nekrasova T. P., Aksenova E. E.
Planning of in telecommunication infrastructure // Information Security Problems. Computer Systems. 2003. № 3. DOI:Rostovtsev A. G., Shemyakina O. V.
To quote:
Rostovtsev A. G., Shemyakina O. V.
On factoring primes in imaginary quadratic orders // Information Security Problems. Computer Systems. 2003. № 3. DOI:Kuritsyn K. A.
To quote:
Kuritsyn K. A.
Security of quantum key distribution protocols with interactive reconciliation // Information Security Problems. Computer Systems. 2003. № 3. DOI:Kornienko A. A., Kotenko A. G.
To quote:
Kornienko A. A., Kotenko A. G.
The method of constructing the information security risk assessment model // Information Security Problems. Computer Systems. 2003. № 4. DOI:Ovchinnikova E. V.
To quote:
Ovchinnikova E. V.
Generalized model of intrusion detection systems // Information Security Problems. Computer Systems. 2003. № 4. DOI:Buinevitch M., Klaykhin V.
To quote:
Buinevitch M., Klaykhin V.
One of the methods to determine the composition of technical means in the information protection system // Information Security Problems. Computer Systems. 2003. № 4. DOI:Sorokin V. N.
To quote:
Sorokin V. N.
Digital signature application for protecting against malicious loadable kernel modules // Information Security Problems. Computer Systems. 2003. № 4. DOI:Monin A. S.
To quote:
Monin A. S.
Evaluation of tools for source code analysis // Information Security Problems. Computer Systems. 2003. № 4. DOI:Bushuev L. V.
To quote:
Bushuev L. V.
Ciphered links in database // Information Security Problems. Computer Systems. 2003. № 4. DOI:Zegzhda D. P.
To quote:
Zegzhda D. P.
Integration of the native security systems and foreign applications using the hybrid operating systems technology // Information Security Problems. Computer Systems. 2003. № 4. DOI:Baranov P. A.
To quote:
Baranov P. A.
The specification of the network traffic analyser based on the expert system approach applying to intrusion detection // Information Security Problems. Computer Systems. 2003. № 4. DOI:Baranov P. A.
To quote:
Baranov P. A.
The architecture development of the network traffic analyser based on the expert system approach applying to intrusion detection // Information Security Problems. Computer Systems. 2003. № 4. DOI:Kort S. S., Rudina E. A.
To quote:
Kort S. S., Rudina E. A.
Evaluation of sequrety of remote hosts requests based on signature-based intrusion detection systems dat // Information Security Problems. Computer Systems. 2003. № 4. DOI:Sichev A. M.
To quote:
Sichev A. M.
Methods of firewall structure and functional formition based on security profile // Information Security Problems. Computer Systems. 2003. № 4. DOI:Kapralov М., Okov I.
To quote:
Kapralov М., Okov I.
Achievability of joint coding with loss signals in information security tasks // Information Security Problems. Computer Systems. 2003. № 4. DOI: