Quarterly journal published in SPbPU
and edited by prof. Peter Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
    • № 1 2007
      • INFORMATION SECURITY ASPECT

        Tregubov A. G.

        AI in systems of defence
        Pages 7-10
      • INFORMATION SECURITY APPLICATION

        Baranov A. P.

        Practical experience of foreign products’ application in secure information systems
        Pages 11-14

        Kriachko A. F., Nazarov A. V., Pantenkov A. P. Shinkevich A. S.

        Synthesis algorithm of the intelligence systems-telemetering protection means based on the navigation of the most probable itinerary of implementation vulnerability
        Pages 15-20
      • APPLIED CRYPTOGRAPHY

        Kabanov A. S.

        Estimation of hardening of protective systems on electronic keys operating the gear the inquiry – answer, without encoding the defended appendix
        Pages 21-26

        Kabanov A. S.

        Usage of the zero knowledge protocols for protective systems on electronic keys
        Pages 27-33

        Rostovtsev A. G.

        Generation of imaginary quadratic orders with given class subgroup
        Pages 34-40

        Rostovtsev A. G.

        On 2-adic method of hash-function inverting
        Pages 41-47
      • NETWORK AND TELECOMMUNICATION SECURITY

        Baranov P. A.

        Classification of software characteristics used for anomaly detection
        Pages 48-54

        Kort S. S., Nemchaninov A. A.

        Intrusion detection system with context consideration
        Pages 55-59
      • FUNDAMENTAL THEORY OF INFORMATION CONFRONTATION

        Zegzhda P. D.

        General trends of information security technologies evolution in the epoch of information warfare
        Pages 60-72
      • TECHNICAL SOLUTION

        Volvenko S. V., Makarov S. B.

        Simulation model of meteor burst communications system
        Pages 73-85
    • № 2 2007
      • INFORMATION SECURITY ASPECT

        Dudorov E. N., Pravikov D. I.

        Determinacy analysis a method of discernment of offences in the computer information ORB
        Pages 7-10

        Kopanitsa George, Mescheriakov Roman

        Application of decidable modal formalism for the estimation of information security
        Pages 11-15

        Tenetko M. I., Peskova O. Y.

        Representation of informational risks in the form of fuzzy semantic network
        Pages 16-19
      • INFORMATION SECURITY APPLICATION

        Abdulmanov R. A., Zegzhda P. D., Kalinin M. O.

        Security settings influence on the risk analysis in secure information systems
        Pages 20-26

        Avramenko V. S.

        Estimation methods of the information security from not authorized access in conditions of the fuzzy data
        Pages 27-31

        Moskvin D. A., Kalinin M. O.

        A calculation of the optimum security configuration in Windows
        Pages 32-38

        Platonov V. V., Teimurov V. A.

        Bytecode instrumentation
        Pages 39-43

        Savelyeva O. V., Platonov V. V.

        Methods of niching in intrusion detection systems
        Pages 44-49

        Fedoseyev V.

        Paradigm change in access control
        Pages 50-57
      • APPLIED CRYPTOGRAPHY

        Grusho A. A., Grusho N. A., Timonina E. E.

        Some applications of data hiding and secure data hiding methods
        Pages 58-63

        Ivashko A. M.

        A model of computer for security requirements impementation analysis
        Pages 64-71

        Sinjuk A. D.

        Potential conditions estimation of key sharing based on noiseless public channels
        Pages 72-82

        Shadrin O. S.

        Using cyclotomic fields in number field sieve for discrete logarithms
        Pages 83-87

        Shtanko S. V.

        Combined information security algorithm based on elliptic curves mathematical tool
        Pages 88-94
      • FUNDAMENTAL THEORY OF INFORMATION CONFRONTATION

        Shlyakhin V. M., Shlyakhin A. V.

        Peculiarities of conflict modeling under conditions of unauthorized access
        Pages 95-99
      • NETWORK AND TELECOMMUNICATION SECURITY

        Lysenko A. G.

        Risks analysis of the information security violation in networks with mobile segments
        Pages 100-104

        Nazarov I. O.

        The web-systems safety analysis in cross-site scripting class vulnerability realization conditions
        Pages 105-117
      • ЗАЩИЩЕННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ

        Efanov D. V.

        Linux security modules as general method for implementing security policies
        Pages 118-122
  • 2006 year
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year