Quarterly journal published in SPbPU
and edited by prof. Dmitry Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2024 year
  • 2023 year
  • 2022 year
  • 2021 year
  • 2020 year
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
    • № 1 2006

        Dudorov E. N.

        Applicability research of the neural-net analysis of system calls sequence in an expert system of programme operating modes recognition
        Pages 5-9

        Lysenko A. G.

        Malicious software for the mobile devices
        Pages 10-14

        Zegzhda D. P.

        Secure hybrid operating system «Linux over Fenix»
        Pages 15-25

        Zegzhda D. P., Kalinin M. O., Lysenko A. G., Moskvin D. A.

        The algorithmic model of access control in the Windows operating systems
        Pages 26-29

        Denisenko M. P.

        In this article we consider the problem of proof the correctness of the cryptographic protocol of open key distribution. the approach to the soluion of his problem is based on technique «Strand spaces»
        Pages 30-39

        Kabanov Artem S.

        The theory of operation of final game models for an estimation of efficiency of protective systems on electronic keys
        Pages 40-43

        Kabanov Artem S.

        Technique of construction of models of protective systems on electronic keys with full overlap and estimation of their efficiency under the given models
        Pages 44-50

        Yakovlev V. A., Korzhik V. I., Bakaev M. V.

        Key agreement protocols based on extractors under the conditions of noisy channel and active adversaries
        Pages 51-67
    • № 2 2006

        Kotenko I. V., Stepashkin M. V., Bogdanov V. S.

        Architectures and models of active vulnerabilities analysis based on simulation of malefactors’ actions
        Pages 7-24

        Kriachko A. F., Nazarov A. V., Pantenkov A. P., Shinkevich A. S.

        The synthesis of intelligence systems-telemetering protection gears optimum composition on the basis of neural problem solving of combinatorial optimization
        Pages 25-30

        Gryzunov V. V.

        Structure-functional synthesis of the model of intrusion prevention system
        Pages 31-38

        Svirin I. S.

        The analytical method of the information representation quality assessment for the typical system behavior
        Pages 39-44

        Zegzhda D. P., Kovalenko S. L.

        Security issues of wireless networks IEEE 802.11a/b/g
        Pages 45-49

        Britov A. G., Mironchikov E. T.

        Redundancy in the information processes of data processing and security systems
        Pages 50-54

        Denisenko M. P.

        Technique «Strand spaces». Analysis of cryptographic protocols using authentication tests
        Pages 55-66

        Kabanov A. S.

        Estimation of hardening of protective systems on electronic keys operating partial encoding of the defended appendix
        Pages 67-73

        Kryachko A. F., Silakov D. M.

        The video sequences data hiding
        Pages 74-78

        Kuritsyn K. A.

        Modern quantum key distribution systems
        Pages 79-82

        Makarov S. B., Xue Wei

        Synthesis of band width efficient signals for the protected wireless telecommunication systems with the limited power resource
        Pages 83-94

        Matveev А. V., Matveev V. V., Magulyan G. G.

        Safety of the automated control systems of objects of electric power industry from electromagnetic terrorism
        Pages 95-98
    • № 3 2006

        Zegzhda P. D., Kort S. S.

        Main modules of the host intrusion detection system
        Pages 7-16

        Sineshuk U. I., Markov O. N., Bondarenko I. V.

        Efficiency neural of optimization at forecasting the condition of information security of the automated system
        Pages 17-20

        Baranov P. А.

        Anomaly detection based on the power of scattering characteristic analysis in a goodness-of-fit test
        Pages 21-29

        Julkov E. V., Platonov V. V.

        Modular approach to build neural networks for anomaly detection
        Pages 30-34

        Zegzhda D. P., Kovalenko S. L.

        Security issues of storing passwords of wireless networks IEEE 802.11a/b/g in OS Windows XP
        Pages 35-37

        Lysenko A. G., Shevelkin A. U.

        Anomaly detection in hybrid networks
        Pages 38-42

        Ovchinnirjva E. V.

        Detection of anomalies on the base of dispersion distance computation
        Pages 43-47

        Ovchinnirjva E. V.

        Transformations of probabilistic suffix trees
        Pages 48-54

        Zegzhda D. P., Korotich A. V.

        Control of access to information resources of multi-ties information systems
        Pages 55-61

        Markov O. N., Kusov E. V., Gvozdik J. M.

        Conformance evaluation of information security of audit objects to requirements of management directives
        Pages 62-71

        Rudina E. A.

        Role-based access control implementation for Windows 2000/XP
        Pages 72-77

        Dmitriev I. L.

        Authentication codes from perfect nonlinear function
        Pages 78-83

        Dmitriev I. L.

        Computation of a message authentication code
        Pages 84-88

        Kusov Е.

        Inspection ratio optimization
        Pages 89-94

        Matveev A. V., Bespalov D. S., Kopacheva M. V., Sinkovskja E. V.

        Consideration of psychological aspect in the model of threat to informational safety in management structure
        Pages 95-98

        Gubin V., Kusov Е., Berezin A.

        Psychological conditions of professional characteristics forming in information security education
        Pages 99-106

        Suprun A. F., Ermilov V. V., Matveev V. V.

        Organisational and technical measures to protect special subjects studying process at the departments of military education
        Pages 107-111
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year