Baranov V. A.
Annotation:
The model of demonstration of invasion of a computer system as a change of the parameters, which are being registered during the system monitoring, is considered in this article. It is supposed that these changes have statistical nature and they can be described using probability-theoretical model of sequence of observations imbalance. In the necessity to differ complicated hypothesizes, several ways of imbalance detection are suggested. In addition, their efficiency in the suggested probability-theoretical models is considered.
To quote:
Baranov V. A.
The detection of observation process imbalance as a method of invasion identification // Information Security Problems. Computer Systems. 2011. № 1. Pp. 7-16. DOI:Keywords:
Invasion, observation process imbalance, probability-theoretic models.Pages:
7-16Belim S. V., Bardichev V. U.
Annotation:
This article describes a study of the possibility of the numerical characteristics of access to information based on access control lists using the model of Take-Grant. These characteristics allow to estimate correctly the probability of access. Since it is possible that it may be a channel of information leakage, but the likelihood of it is so small that the installation of some additional mechanisms of protection simply makes no sense.
To quote:
Belim S. V., Bardichev V. U.
Numerical characteristics of access to information in the extended model Take-Grant // Information Security Problems. Computer Systems. 2011. № 1. Pp. 17-23. DOI:Keywords:
Computer security, model of Take-Grant, access graph.Pages:
17-23Devyanin P. N.
Annotation:
This article represents role DP-model access control and information flows in operating systems of Linux sets which take into account some their essential features. The article focuses basic attention on formal description mechanism of mandatory integrity control, and also on conditions and results of application rules of transformation conditions. The article represents analysis of properties restrictions on role access control which invariantly concerning nonmonotonic rules of transformation conditions.
To quote:
Devyanin P. N.
Modeling of role access control in operating systems of Linux sets // Information Security Problems. Computer Systems. 2011. № 1. Pp. 24-43. DOI:Keywords:
Computer security, operating system, DP-model.Pages:
24-43Moskvin D. A.
Annotation:
The article presents a comprehensive approach to automation of security configuring at operating systems. This technique allows to implement a set of corporative security policy requirements in accordance with a usage profile of the configured system. As the result, assurance in sustainability of the performance, elimination of "human factor" influence, as well as speed up of the process of security setting up are reached using the suggested approach.
To quote:
Moskvin D. A.
An approach to automation of the security settings in operating systems // Information Security Problems. Computer Systems. 2011. № 1. Pp. 44-49. DOI:Keywords:
Security settings, security of operating systems, stability of security.Pages:
44-49Semenova N. A.
Annotation:
This paper describes a methodology of evaluation the level of compliance between company information streams and a RBAC system. Several criteria for redundant permissions detection and role assignment rules quality assessment are proposed.
To quote:
Semenova N. A.
Compliance evaluation between information streams of the company and RBAC system // Information Security Problems. Computer Systems. 2011. № 1. Pp. 50-62. DOI:Keywords:
RBAC system, role assignment rules, RBAC efficency evaluation.Pages:
50-62Zavodtsev I. V., Gaynov A. E.
Annotation:
The feature of modern automated systems is a high concentration of information of limited distribution in these systems. This feature leads to conflict between users and information security systems. The application of biometrics-cryptographic technologies in the automated systems will solve the problem of access control to protected resources and meets user requirements and requirements for information protection.
To quote:
Zavodtsev I. V., Gaynov A. E.
Application of biometriko-cryptographic technologies for protection of the automated data processing systems // Information Security Problems. Computer Systems. 2011. № 1. Pp. 63-69. DOI:Keywords:
Automated data processing system, the artificial neural network, Kohonen’s map, a means of highly reliable biometric authentication, access control tools.Pages:
63-69Scheglov A. U., Ogolyuk A. A., Ilyin E. V.
Annotation:
This work describes the problem of providing sufficiency of the information protection facility gears suite, depending on its usage conditions. The revealed base principle allows to speak about sufficiency of information security gears suite, when developing high and multipurpose system facilities. Some problems of practical implementation of these gears are also discussed.
To quote:
Scheglov A. U., Ogolyuk A. A., Ilyin E. V.
Practical implementation of the sufficiency information protection facility gears suite // Information Security Problems. Computer Systems. 2011. № 1. Pp. 70-73. DOI:Keywords:
The mechanism of protection of the information, protection of independent computers, access control, device identification.Pages:
70-73Andrushechkin U. N., Karetnikov V. V.
Annotation:
In the present study examined the transfer of correction information and the impact of underlying surfaces in the transmission range of differential corrections.
To quote:
Andrushechkin U. N., Karetnikov V. V.
Features of influence underlying surfaces on range of transfer of the correcting data // Information Security Problems. Computer Systems. 2011. № 1. Pp. 74-77. DOI:Keywords:
Control and correction station, underlying surface, attenuation function, field intensity.Pages:
74-77Barschevsky E.
Annotation:
In article features of the approach to safety of the ship automated systems are considered. In article communication between safety of functioning of the automated systems with questions of optimization of the processes proceeding in difficult automated systems is underlined. Optimization is based on criteria of orthogonality and minimization.
To quote:
Barschevsky E.
Security of the ship automated systems // Information Security Problems. Computer Systems. 2011. № 1. Pp. 78-80. DOI:Keywords:
Minimization bias, quasi-optimal plans, experimental design, polynomial model, security of automated systems.Pages:
78-80Golubcov D. A., Sidorov K. G., Sikarev I. A.
Annotation:
In this article algorithms of calculation and interference immunity of AIS under influence of mutual interference were examined, and also investigation of influence of concentrated on spectrum disturbances on the working zone dimentions of AIS was performed.
To quote:
Golubcov D. A., Sidorov K. G., Sikarev I. A.
Interference immunity and influence of disturbances on working zone dimentions of river automatic identification systems // Information Security Problems. Computer Systems. 2011. № 1. Pp. 81-86. DOI:Keywords:
Interference immunity, automatic identification systems, spectrum of hindrances.Pages:
81-86Yakovlev V., Korzhik V., Kovajkin Yu.
Annotation:
We describe a key sharing protocol based on a concept of smart randomly excited antenna and multipath wave propagation considered in the first part of this paper. Reliability, randomness and security of the key string shared by legal users depending on the correlation between legal and illegal signals are estimated. Both erasing of unreliable bits and error correction codes are used. Parameters of key sharing protocols are optimized in order to maximize the key rate. We conclude that appropriated choice of parameters allows provide all requirements even in the case of noiseless eavesdropping channel in contrast of all known previous protocols of the key distribution over noisy channels.
To quote:
Yakovlev V., Korzhik V., Kovajkin Yu.
Key sharing protocol for wireless local area networks based on the use of randomly excited antenna with variable diagram under the condition of multipath wave propagation. Part II. Description of key sharing system and optimization of its parameters // Information Security Problems. Computer Systems. 2011. № 1. Pp. 87-99. DOI:Keywords:
System of distribution of keys, optimization, wireless local networks, factor of correlation of signals.Pages:
87-99Аristarkhov I. V.
Annotation:
We introduce key update planning models depending from character of adversary activities. The proposed formalization provides the possibility of finding the optimal timing for key update process aimed at minimization of the system idle time.
To quote:
Аristarkhov I. V.
Key update planning in electronic document verification systems // Information Security Problems. Computer Systems. 2011. № 1. Pp. 100-104. DOI:Keywords:
Electronic document verification system, key management, private key compromise, time cost, key update planning.Pages:
100-104Kalinin M., Konoplev A.
Annotation:
The paper reviews the main problems encountered in the organizing of preparing the trusted executable environment for multiprotocol network devices. Also the approach to solve this problem is presented.
To quote:
Kalinin M., Konoplev A.
Approach to providing the trusted executable environment for multiprotocol network devices // Information Security Problems. Computer Systems. 2011. № 2. Pp. 7-11. DOI:Keywords:
Information security, trusted environment, network, multiprotocol devices.Pages:
7-11Kalinin M., Markov Y.
Annotation:
The paper raises the problem of IT-security control in Grid-systems. Comparison of security-relevant mechanisms implemented in BOINC, Gridbus, Globus Toolkit, UNICORE, and gLite is presented. That allows us to figure out common approaches applied to realize security in well-known Grid-systems. As the result, formal model of Grid access control and universal method of automated security verification in Grid-systems have been suggested.
To quote:
Kalinin M., Markov Y.
Verification of security policies requirements in Grid-systems // Information Security Problems. Computer Systems. 2011. № 2. Pp. 12-21. DOI:Keywords:
Access control, grid, model, security, security policy, state, verification.Pages:
12-21Kort S. S., Shumov A. V.
Annotation:
This article is devoted to the task of network traffic classification and application of this task to solution of network security problems. Payload is presented in this work as n-gram and on this basis we can talk about network protocol and content recognition and anomaly detection.
To quote:
Kort S. S., Shumov A. V.
Automatical recognition of network protocols and network packets payload type based on n-gramm analyses // Information Security Problems. Computer Systems. 2011. № 2. Pp. 22-32. DOI:Keywords:
Network protocol application level, intrusion detection system, pattern recognition, anomaly detection.Pages:
22-32Platonov V. V., Semenov P. O.
Annotation:
The possibility of usage dimension reduction techniques to generate a list of most significant parameters for detecting network attacks is analyzed. In this paper is proposed the model of intrusion detection system with modular architecture, which allows classifying packets by different support vector machines.
To quote:
Platonov V. V., Semenov P. O.
Forming feature space for detecting network attack // Information Security Problems. Computer Systems. 2011. № 2. Pp. 33-39. DOI:Keywords:
Intrusion detection system, support vector machine, dimension reduction, principal component analysis.Pages:
33-39Platonov V. V., Yushkevitch I. A.
Annotation:
The article describes hybrid intrusion detection model. For traffic classification on network and transport layers it is offered to use support vector machine (SVM). Lexicographic methods of application level protocols analysis possibility reseached.
To quote:
Platonov V. V., Yushkevitch I. A.
Hibrid model of intrusion detection system based on lexicographic method // Information Security Problems. Computer Systems. 2011. № 2. Pp. 40-46. DOI:Keywords:
Intrusion detection systems, support vector machines, lexicographic methods.Pages:
40-46Yakovlev V., Levin I.
Annotation:
In [1], the authors proposed a method of protection against DDOS-attacks which combines attack detection techniques on the hosts and tracing the sources of attacks using the network routers. Tracing of the attack sources is implemented by reconstructing the packets’ route from the source of the attack to the victim. This paper presents the simulation results of this method. To construct the network topology graph models were used: a tree graph with the victim at the root and the random Euclidean graph. We tested the effectiveness of the method for tracing DDoS-attack sources using these models when the number of attackers did not exceed 500. To test the effectiveness of the method in a large-scale network with hundreds of autonomous systems, thousands of users and tens of thousands of attackers we performed the simulation using OMNet. The results of the simulation allowed to obtain more detailed information about the functioning of the method including the process of normalization of legitimate traffic by detecting and blocking attackers using this method.
To quote:
Yakovlev V., Levin I.
Simulation of the combined method for tracing the sources of DDOS-attacks // Information Security Problems. Computer Systems. 2011. № 2. Pp. 47-61. DOI:Keywords:
DDoS-attacks, traceback, simulation, Euclidian graph.Pages:
47-61Artamonov A. V., Vasilev P. N., Makhovenko E. B.
Annotation:
The article suggests a new way for providing the capability of the signatory authority revocation from some group member from a specific time point in the BBS group signature scheme. Security of this mechanism is based on the adding new trusted party into the group signature scheme. This new subject is in charge of the time reference of keys and signatures, as well as of the other subjects synchronization in revocation procedure.
To quote:
Artamonov A. V., Vasilev P. N., Makhovenko E. B.
Consistent membership revocation in the BBS group signature scheme // Information Security Problems. Computer Systems. 2011. № 2. Pp. 62-75. DOI:Keywords:
Group signature, BBS group signature scheme, extended dynamic ED-BBS scheme, membership revocation, time manager.Pages:
62-75Alexander Rostovtsev, Alexey Bogdanov and Mikhail Mikhaylov
Annotation:
Method of secure evaluation of polynomial y = F(x1, …, xk) over some rings on untrusted computer is proposed. Two models of untrusted computer are considered: passive and active.
To quote:
Alexander Rostovtsev, Alexey Bogdanov and Mikhail Mikhaylov
Method of secure evaluation of polynomial in untrusted medium using ring homomorphisms // Information Security Problems. Computer Systems. 2011. № 2. Pp. 76-85. DOI:Keywords:
Secure computation, ring homomorphism, public key encryption.Pages:
76-85Golubcov D. A., Sikarev I. A., Sidorov K. G.
Annotation:
In article the method of construction and algorithms of functionally steady adaptive automated identification systems are considered at influence of mutual hindrances.
To quote:
Golubcov D. A., Sikarev I. A., Sidorov K. G.
Noise stability of the adaptive automated identification systems at influence of mutual hindrances // Information Security Problems. Computer Systems. 2011. № 2. Pp. 86-90. DOI:Keywords:
Mutual hindrances, identification systems.Pages:
86-90Pshenitsyn K. V., Sikarev I. A., Mulganov S. V., Sidorov R. G.
Annotation:
The article proposes two ways to automate the signal reception for better management of information and algorithmic support of the CDMA Globalstar satellite system in the presence of multiplicative noise to improve the efficiency of AIS in the TMS on inland waterways.
To quote:
Pshenitsyn K. V., Sikarev I. A., Mulganov S. V., Sidorov R. G.
Search of the phasemodulated signal in the presence of multiplicative noise // Information Security Problems. Computer Systems. 2011. № 2. Pp. 91-94. DOI:Keywords:
CDMA, Globalstar.Pages:
91-94Babash A. V.
Annotation:
The formulas for the parameters of methods for determining the state and the input word automaton, based on the preliminary construction of his entourage of models.
To quote:
Babash A. V.
Using approximate models of the automaton in the task of determining the initial state and input word automaton on the output word // Information Security Problems. Computer Systems. 2011. № 3. Pp. 7-12. DOI:Keywords:
The automatic machine, entrance sequence, condition, the total method, the approached model, labor input.Pages:
7-12Zgurskiy A. S., Korbainova E. V.
Annotation:
This article represents the algorithm for appraisal information assets requirements in the security properties. Influence of safety property on data center activity is estimated.
To quote:
Zgurskiy A. S., Korbainova E. V.
Definition of level of vulnerability and estimation of influence of property of safety of the active on data-processing centre activity // Information Security Problems. Computer Systems. 2011. № 3. Pp. 13-16. DOI:Keywords:
Security, credit institution, security property, information security, data center.Pages:
13-16Maluk A. A.
Annotation:
Questions of the of information security theory’s methodological basis formation are considered. Necessity of using for this purpose of a wide range of non-formal heuristic methods based on productive human thinking additionally to the classic system theory is stressed. A classification of the informal methods forming the basis of the informal system theory is given.
To quote:
Maluk A. A.
Methodological basis for the information security theory // Information Security Problems. Computer Systems. 2011. № 3. Pp. 17-23. DOI:Keywords:
Information security, information security theory, system theory, informal system theory, system approach, system analysis.Pages:
17-23Kornev А. А.
Annotation:
The paper describes the problem of building an operating system for specialized trusted information processing system development. Trusted treatment implies the absence of the possibility of unauthorized information output to the external environment, the so-called "leakage" of information, through any input-output channels. The concept and practical implementation of the system with a minimal kernel as a basic component of the information processing system is described.
To quote:
Kornev А. А.
Operating system for constructing specialized trusted information processing systems // Information Security Problems. Computer Systems. 2011. № 3. Pp. 24-29. DOI:Keywords:
Operating system, information security, trusted information processing.Pages:
24-29Ageev S. A., Sherstjuk Y. M., Saenko I. B., Polubelova O. V.
Annotation:
Conceptual basics of automation control of protected multi-service networks (PMN) are discussed. The conceptual management model of PMN and basic functional tasks are considered. The framework of mathematical modeling functional control tasks for PMN is given.
To quote:
Ageev S. A., Sherstjuk Y. M., Saenko I. B., Polubelova O. V.
Conceptual basics of automation control of protected multi-service networks // Information Security Problems. Computer Systems. 2011. № 3. Pp. 30-39. DOI:Keywords:
Protected multi-service network, telematic network services, automation control, TMN model.Pages:
30-39Kotenko I. V., Stepashkin M. V., Doynikova E. V.
Annotation:
The paper suggests an attack trees based approach to protection analysis of information systems which extends approach suggested by the authors earlier. The main difference is in introducing of different conceptions, models and frameworks related to social engineering attacks. The approach is intended for use in perspective protection analysis systems.
To quote:
Kotenko I. V., Stepashkin M. V., Doynikova E. V.
Protection analysis of information systems taking into account social engineering attacks // Information Security Problems. Computer Systems. 2011. № 3. Pp. 40-57. DOI:Keywords:
Analysis, protection, social engineering attacks.Pages:
40-57Аristarkhov I. V.
Annotation:
Protection electronic document in specialized information system of the general use is realized by means of integrated electronic documents verification subsystems, using electronic signature and public key infrastructure. In article is considered some of the threats of the operating the facilities electronic signature, directed on compromising of the key electronic signature. As one of the organizing measures of the reluctance specified threat is offered building efficient strategy determinations duration of the keys.
To quote:
Аristarkhov I. V.
About some threat of information safety in electronic documents verification subsystem of the general use information system // Information Security Problems. Computer Systems. 2011. № 3. Pp. 58-63. DOI:Keywords:
Electronic documents verification subsystem, certification authority, registration authority, request processing, public key certificate.Pages:
58-63Zhuravlev V. M.
Annotation:
InThe task of optimization of range and size of the shore or base radio station zones is considered using stochastic models of information channels taking into account radio wave propagation, changing of obstructing relief between shore station and receiver of the ship, movement of ship station relating to shore one.
To quote:
Zhuravlev V. M.
Topological structure of coverage of trunked radio communication system on inner water way // Information Security Problems. Computer Systems. 2011. № 3. Pp. 64-72. DOI:Keywords:
Inner water ways, automatic vessel traffic service, trunked radio stations, obstructing relief, probability of error, coverage, receiver sensivity, corporative river information system, river information services (RIS), obstructing relief, Rayleigh distribution.Pages:
64-72Rudyih S. V., Sikarev I. A., Sidorov K. G.
Annotation:
This article describes the algorithms and structural schemes of adaptive coherent AIS, including the structure of "base station transponder, correspondent for the opposite and orthogonal binary signals.
To quote:
Rudyih S. V., Sikarev I. A., Sidorov K. G.
Synthesis of functionally stable coherent automated information systems // Information Security Problems. Computer Systems. 2011. № 3. Pp. 73-76. DOI:Keywords:
Inner water ways, automatic vessel traffic service, interburst interference, coverage, transmitter power, probability of error.Pages:
73-76Azhmuhamedov I. M., Kolesova N. A.
Annotation:
The technique of development and storage of key sequences with use of graphic files, and also a technique of selection of images approaching for this purpose are offered and pro.
To quote:
Azhmuhamedov I. M., Kolesova N. A.
Method of forming key information from image files // Information Security Problems. Computer Systems. 2011. № 3. Pp. 77-80. DOI:Keywords:
Key sequence, the image, sequence of random numbers, RGB-channels of image.Pages:
77-80Voycekhovsky S. V., Khomonenko A. D.
Annotation:
The approach of revealing of harmful program influences on the automated systems on the basis of an fuzzy conclusion of decisions by means of algorithm of Mamdani is offered. Rules of the fuzzy conclusion are proved. Algorithm realization in system of support of decision-making is described.
To quote:
Voycekhovsky S. V., Khomonenko A. D.
Revealing of harmful program influences on the basis of the fuzzy conclusion // Information Security Problems. Computer Systems. 2011. № 3. Pp. 81-91. DOI:Keywords:
Harmful program influences, indistinct conclusion, system of support of decision-making.Pages:
81-91Zegzhda D. P., Karetnikov A. V.
Annotation:
This article observes different aspects of cloud computing security. It also does basic treats analysis for clouds. Approaches and specificity of providing security for cloud computing considered.
To quote:
Zegzhda D. P., Karetnikov A. V.
Cloud computing security. Problems and prospect // Information Security Problems. Computer Systems. 2011. № 4. Pp. 7-15. DOI:Keywords:
Cloud computing, distributed computing security, hypervisor security, virtualization.Pages:
7-15Khomonenko A. D., Bubnov V. P., Krasnov S. A., Eremin A. S.
Annotation:
Application of model of single-channel non-stationary system of service for an estimation of efficiency of work of client-server system of an automatic rubrication of documents in system of electronic document circulation of HIGH SCHOOL is considered. In model the assumption about exponential distributions of intervals of time between the moments of receipt of inquiries and durations their service is used. The model allows to consider non-stationary character of process of receipt and service of demands for the decision of problems in client-server system of an automatic rubrication.
To quote:
Khomonenko A. D., Bubnov V. P., Krasnov S. A., Eremin A. S.
Model of functioning of system of the automatic rubrication of documents in the non-stationary mode // Information Security Problems. Computer Systems. 2011. № 4. Pp. 16-23. DOI:Keywords:
Automatic categorization, electronic document management system (dms)-dependent system, the exponential distribution.Pages:
16-23Baranov V. A.
Annotation:
Several types of statistics, which are used for a posteriori estimation of the moment of imbalance of an observation process, are considered in this article as the models of influence of intrusion into a computer system on the parameters of the events, which are observed. Also the possibility of construction of an effective statistical procedure of estimation of the intrusion moment, while the difference in observation parameters of the system before the imbalance and after it is little, is estimated. The results of a posteriori statistical estimation of the moment of intrusion for the array of data, which has been gathered from the working system while it was being infected by a virus, are described.
To quote:
Baranov V. A.
Estimation of the moment of intrusion using statistical methods // Information Security Problems. Computer Systems. 2011. № 4. Pp. 24-31. DOI:Keywords:
Posteriori estimation, the intrusion moment, infected by a virus.Pages:
24-31Kort S. S., Rudina E. A.
Annotation:
The paper considers the approach to the identification of network protocols on the basis of variably-signature analysis.
To quote:
Kort S. S., Rudina E. A.
Approach to the analysis of client-server interaction based on declarative description of networking protocol // Information Security Problems. Computer Systems. 2011. № 4. Pp. 32-40. DOI:Keywords:
Variably-signature analysis, network protocols, client-server interaction.Pages:
32-40Khomonenko A. D., Voycekhovsky S. V.
Annotation:
The approach to increase of accuracy of an fuzzy conclusion of decisions by means of algorithm of Mamdani in systems of detection of intrusions is offered. At the heart of the approach estimation of degree of uncertainty (размытости) terms of linguistic variables and their updating by means of linguistic modifiers lies.
To quote:
Khomonenko A. D., Voycekhovsky S. V.
Specification of the fuzzy conclusion on the basis of the Mamdani algorithm in system of detection of intrusions // Information Security Problems. Computer Systems. 2011. № 4. Pp. 41-48. DOI:Keywords:
Fuzzy conclusion of decisions, the linguistic modifier, linguistic variables.Pages:
41-48Vetrov U. V., Zavyalov S. V.
Annotation:
Influence of JPEG-conversion on a noise stability of symbols (messages) reception which embedded in digital video images is considered. Dependence of error probability on compression ratio at information embedding at level of factors DCT has threshold character.
To quote:
Vetrov U. V., Zavyalov S. V.
Influence of JPEG-conversion on a noise stability of symbols (messages) reception which embedded in digital video images // Information Security Problems. Computer Systems. 2011. № 4. Pp. 49-55. DOI:Keywords:
Steganography, JPEG, error probability, digital images, pseudorandom sequence, DCT.Pages:
49-55Zgurskiy A. S., Korbainova E. V.
Annotation:
This article represents definition of requirements degree of information assets for data centre in credit institution. Criteria of an estimation are considered, the basic directions of responsibility come to light.
To quote:
Zgurskiy A. S., Korbainova E. V.
Evaluation of information assets requirements degree in the security properties for data centre in a credit institution // Information Security Problems. Computer Systems. 2011. № 4. Pp. 56-60. DOI:Keywords:
Security, credit institution, security property, information security, data centre.Pages:
56-60Rudyih S. V., Sikarev I. A. Sidorov K. G.
Annotation:
The purpose of this article is to synthesize a device with an external (on the line "base station-transponder") and internal (only in the structure of the transponder) "rings" adjustment with complex effects of noise and focusing on spectrum interference.
To quote:
Rudyih S. V., Sikarev I. A. Sidorov K. G.
Algorithms are functionally stable incoherent automated identification systems // Information Security Problems. Computer Systems. 2011. № 4. Pp. 61-65. DOI:Keywords:
Inner water ways, automatic vessel traffic service, interburst interference, coverage, transmitter power, probability of error.Pages:
61-65Rudih S. D., Volkova T. A., Tihonenko A. M.
Annotation:
The focus of the study is to analyze the main temporal, spectral, correlation, and other features and opportunities to apply complex discrete-manipulated signals (DMS) with linear frequency modulation in river automated identification systems (AIS).
To quote:
Rudih S. D., Volkova T. A., Tihonenko A. M.
Discrete-manipulated signals with linear frequency modulation in automated identification systems in inner water ways // Information Security Problems. Computer Systems. 2011. № 4. Pp. 66-69. DOI:Keywords:
Discrete-manipulated signals (DMS), signals with linear modulation, mutual interference, automated identification systems (AIS), coefficient of mutual difference (CMD).Pages:
66-69