Quarterly journal published in SPbPU
and edited by prof. Peter Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
    • № 1 2008
      • INFORMATION SECURITY ASPECT

        Kirsanov Y. G., Kisly N. G., Strekalov V. V.

        Methodical approach to nomenclature substantiation of term included in terminological standards on information protection
        Pages 7-12
      • NETWORK AND TELECOMMUNICATION SECURITY

        Bogdanov V. V., Sinadsky N. I.

        Complex computer attack intrusion detection algorithm based on signs obtained from formalized security policy statements using hierarchical fuzzy systems apparatus
        Pages 13-26

        Kort S. S., Rudina E. A.

        The architecture of universal kernel of the monitoring and intrusion protection systems
        Pages 27-39

        Nikiforov Y.  I., Svistunov S. G., Khomonenko A. D.

        Confidence of secret information leakage channels determination with help of stochastic algorithm
        Pages 40-43

        Petrenko S. A.

        Method of detection of computer attacks on the basis of similarity invarients
        Pages 44-47

        Savelyeva O. V.

        Access control methods of sessions of videoconferencing
        Pages 48-52

        Starobinec D. U., Vorobiev E. G.

        Protection of the information in corporate computer networks on the basis of address representation transferred messages
        Pages 53-56
      • APPLIED CRYPTOGRAPHY

        Andrushchenko D. M., Kozina G. L., Piza D. M.

        Practical estimation of asymmetric cryptosystem security
        Pages 57-62

        Korzhik V. I., Zubarev M. A.

        Distortion free exact authentiation of bkinary images
        Pages 63-69

        Rostovtsev A. G.

        On polynominal interpolation of maps of sets of pn elements
        Pages 70-78

        Stolbunov A. G.

        Towards the provable security of isogeny cryptosystems
        Pages 79-87

        Yakovlev V., Shutyy R.

        Modified bit commitment protocol for unfair noisy channel
        Pages 88-95
      • TECHNICAL SOLUTION

        Vishnevskiy U. G., Sikarev I. A.

        Electromagnetic zaschischennost satellite channels of digital information systems radionavigatsionnyh
        Pages 96-100
      • INFORMATION SECURITY APPLICATION

        Petigin A. F., Miroshnikov P. V.

        Basic input-output system protection providing safety boot
        Pages 101-105
    • № 2 2008
      • INFORMATION SECURITY ASPECT

        Lysenko A. G.

        Information systems security modelling based on the risks description lanuage
        Pages 7-14

        Skiba V. Y.

        Timed algebraic Petri nets
        Pages 15-22
      • INFORMATION SECURITY APPLICATION

        Baranov A. P., Baranov P. A.

        The main issues of creation and development of modern secured operating systems
        Pages 23-26

        Arhipochkin E. V.

        Integrity providing system for computer-based systems with DBMS. Architecture and intercomponent communication
        Pages 27-38

        Dudorov E. N.

        Technology SADT «Structured analysis and design technique» as the tool of simulation of illegal operations in sphere of the computer information and a resource of databases structures designing
        Pages 39-43
      • NETWORK AND TELECOMMUNICATION SECURITY

        Ankudinov P. V.

        Intrusion detection with feedback
        Pages 44-47

        Petrenko S. A., Beliaev A. V.

        The comparative analysis of methods of detection of computer attacks
        Pages 48-53
      • APPLIED CRYPTOGRAPHY

        Arkhangelskaya A. V., Arkhangelskii V. G.

        An approach to high-speed random bit generator, based on quantum process intensity measuring
        Pages 54-64

        Burov I. N., Mironchikov E. T.

        Secret sharing schemes for identification of cheaters
        Pages 65-70

        Vorobiev E. G.

        Synthesis of the quantum report of transfer on the basis of model pseudo-casual sequences- polarizing modulation of the signal
        Pages 71-75

        Samokhina M. A.

        Cryptosystems based on linear codes
        Pages 76-83
      • SPECIAL IT

        Baranov Y. A.

        Statistical independence in models of processing in AIS texts
        Pages 84-91

        Gluhov A. A., Klyahin V. N., Sinkovskaya E. V.

        Providing information security products for testing special-purpose
        Pages 92-96

        Petuhov U. V., Sikarev I. A.

        Electromagnetic security base stations river automated information systems in mutual interference
        Pages 97-100
    • № 3 2008
      • INFORMATION SECURITY APPLICATION

        Danilenko A. U.

        Completion of information management systems for provision of required level of data protection
        Pages 7-13

        Husni, Afanasyev S. V.

        Architecture and modeling honeynet
        Pages 14-21
      • ЗАЩИЩЁННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ И ДОВЕРЕННАЯ СРЕДА

        Molodchenko J. A., Sotov L. S., Harin V. N.

        About formation of the entrusted environment of server control systems by databases
        Pages 22-26
      • БЕЗОПАСНОСТЬ РАСПРЕДЕЛЁННЫХ СИСТЕМ И ТЕЛЕКОММУНИКАЦИЙ

        Petrenko S. A., Beliaev A. V.

        Method of detection of not authorized copying Ethernet-traffic
        Pages 27-31
      • SPECIAL IT

        Baranov Y. A.

        Using of dissimilar polynomial schemes in automatic rubrication
        Pages 32-47
      • SOFTWARE SECURITY

        Dolgova K. N., Chernov A. V., Derevenets E. O.

        Methods and algorithms for reconstructing programs from assembly to high level language
        Pages 48-62

        Dudorov E. N.

        Behaviour a the analysis of applications in the computing environment in interests of the software hidden information effect revealing
        Pages 63-65

        Tihonov A. U., Avetisyan A. I., Padaryan V. A.

        Methodology of exploring of an algorithm from binary code by dynamic analisys
        Pages 66-71

        Usupov R.M., Tokhtabaev A., Skormin V., Dolgikh A., Tukeev U., Altaibek А.

        Detection of worm propagation engines in the system call domain using colored Petri nets
        Pages 72-88
    • № 4 2008
      • INFORMATION SECURITY APPLICATION

        Burenin P. V.

        DP-mоdel of file systems
        Pages 7-17

        Gorkovenko E. V., Sokolova S. P.

        The organization of the system with mandate politics of information security
        Pages 18-27

        Sobolev S. S., Sotov L. S., Kharin V. N.

        Dynamic formatting of structural objects of storehouses of data
        Pages 28-33
      • SECURE OPERATING SYSTEMS AND TRUSTED ENVIRONMENT

        Yavno D. M.

        On inadequacy of built-in protection against rootkits in Microsoft Windows x64 operating systems
        Pages 34-40
      • APPLIED CRYPTOGRAPHY

        Baranov A. P., Akimov S. L., Bodrov A. G.

        Cryptographic tools for the protection of personal data
        Pages 41-47

        Kharinov M. V., Zabolotsky V. P.

        Virtual memory image model in application to document protection
        Pages 48-55
      • NETWORK AND TELECOMMUNICATION SECURITY

        Rudina E. А.

        The generalized notion of network protocols
        Pages 56-60
      • TECHNICAL SOLUTION

        Sikarev A. A., Sikarev I. A.

        Functional stability of the basic characteristics automated identification systems on inland waterways
        Pages 61-65
      • SOFTWARE SECURITY

        Belyakov I. A., Eremeev M. A.

        The approach to construction of the subsystem of decision-making on presence/absence of not declared possibilities in the certificated software on the basis of the data of the static analysis
        Pages 66-72
      • EDUCATION PROBLEMS

        Pleshkevich E. A.

        The review on the text-book «Documents management» (Authors: E. A. Bardaev, V. B. Kravchenko)
        Pages 73-78
  • 2007 year
  • 2006 year
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year