Streltsov A. A.
To quote:
Streltsov A. A.
The information, forms and properties // Information Security Problems. Computer Systems. 2002. № 1. DOI:Kalinin M. O.
To quote:
Kalinin M. O.
The structure and application of the language description of security politics // Information Security Problems. Computer Systems. 2002. № 1. DOI:Kononov A. A., Burdin O. A.
To quote:
Kononov A. A., Burdin O. A.
The axiomatics estimation of a risk violation of information security of the computer organizational systems // Information Security Problems. Computer Systems. 2002. № 1. DOI:Zegzhda P. D., Novicov V. K., Prosichin V. P., Harchenko I. P.
To quote:
Zegzhda P. D., Novicov V. K., Prosichin V. P., Harchenko I. P.
The modern aspects of security of informational – telecommunication systems // Information Security Problems. Computer Systems. 2002. № 1. DOI:Kort S. S.
To quote:
Kort S. S.
The computer viruses and worms. The modern state of problem // Information Security Problems. Computer Systems. 2002. № 1. DOI:Rostovsev A. G., Machovenko E. B.
To quote:
Rostovsev A. G., Machovenko E. B.
Two methods to the analysis of the block ciphers // Information Security Problems. Computer Systems. 2002. № 1. DOI:Eremeev M. A., Kornienko A. A.
To quote:
Eremeev M. A., Kornienko A. A.
The development and researches of properties controlled operational substitutions above the vectors of the large dimension in interective block cryptoalgorithms // Information Security Problems. Computer Systems. 2002. № 1. DOI:Vasilev Y. S., Zegzhda P. D.
To quote:
Vasilev Y. S., Zegzhda P. D.
The problems and perspectives of technicians training in information security field // Information Security Problems. Computer Systems. 2002. № 1. DOI:Zegzhda P. D., Kalinin M. O.
To quote:
Zegzhda P. D., Kalinin M. O.
The complex of laboratory works on discipline «The bases of an artificial intellect» // Information Security Problems. Computer Systems. 2002. № 1. DOI:Machovenko E. B.
To quote:
Machovenko E. B.
The educational course «The additional chapters of the numerical analysis» // Information Security Problems. Computer Systems. 2002. № 1. DOI:Zegzhda D. P., Kalinin M. O.
To quote:
Zegzhda D. P., Kalinin M. O.
A mathematical basis of complex security policies design and specification // Information Security Problems. Computer Systems. 2002. № 2. DOI:Antimonov C. G. Kurikalov V. B.
To quote:
Antimonov C. G. Kurikalov V. B.
New «Virus–antivirus» line in computer and network world // Information Security Problems. Computer Systems. 2002. № 2. DOI:Vovk A. M.
To quote:
Vovk A. M.
GDB remote debugging // Information Security Problems. Computer Systems. 2002. № 2. DOI:Gorelenkov A. P., Zegzhda D. P.
To quote:
Gorelenkov A. P., Zegzhda D. P.
Implementation of the directory service based on Phoenox secure operating system // Information Security Problems. Computer Systems. 2002. № 2. DOI:Kort S. S., Petrov A. V.
To quote:
Kort S. S., Petrov A. V.
Store unit for the network automated vulnerabilities detection system // Information Security Problems. Computer Systems. 2002. № 2. DOI:Rostovtsev A. G.
To quote:
Rostovtsev A. G.
Cryptology and information security // Information Security Problems. Computer Systems. 2002. № 2. DOI:Okov I. N.
To quote:
Okov I. N.
Estimation of protection of cryptographic coded messages with certain distortion // Information Security Problems. Computer Systems. 2002. № 2. DOI:Savelev M. F.
To quote:
Savelev M. F.
The linear codes in the wiretap channels // Information Security Problems. Computer Systems. 2002. № 2. DOI:Fimin M. D.
To quote:
Fimin M. D.
Memory management facilities of modem operating systems // Information Security Problems. Computer Systems. 2002. № 2. DOI:Tarazevitch S. A.
To quote:
Tarazevitch S. A.
Telephone networks security // Information Security Problems. Computer Systems. 2002. № 2. DOI:Vasilyev Y. S., Zegzhda P. D.
To quote:
Vasilyev Y. S., Zegzhda P. D.
Education problems and prospects in information security // Information Security Problems. Computer Systems. 2002. № 2. DOI:Ivanov A. V.
To quote:
Ivanov A. V.
The problems of scientific and educational literature protection from publicational spam // Information Security Problems. Computer Systems. 2002. № 2. DOI:Zegzhda D. P., Kalinin M. O.
To quote:
Zegzhda D. P., Kalinin M. O.
System security evalution // Information Security Problems. Computer Systems. 2002. № 3. DOI:Kort S. S., Lysak S. I.
To quote:
Kort S. S., Lysak S. I.
The buffer overflow problem in C++ // Information Security Problems. Computer Systems. 2002. № 3. DOI:Zegzhda P. D., Otavin A. D.
To quote:
Zegzhda P. D., Otavin A. D.
Methods of construction of the protected information systems and their application in educational process // Information Security Problems. Computer Systems. 2002. № 3. DOI:Dmitriev I. L., Ovtchinnikova E. V.
To quote:
Dmitriev I. L., Ovtchinnikova E. V.
The prospects of public key infrastructurte usage for securt distributed networks development // Information Security Problems. Computer Systems. 2002. № 3. DOI:Dmitriev I. L., Novikov A. A.
To quote:
Dmitriev I. L., Novikov A. A.
Public key infrastructure and its usage in Russian railway transport // Information Security Problems. Computer Systems. 2002. № 3. DOI:Zegzhda D. P., Tarazevitch S. A.
To quote:
Zegzhda D. P., Tarazevitch S. A.
Today’s situation in computer technologies security and its reasons // Information Security Problems. Computer Systems. 2002. № 3. DOI:Merkusheva A. V.
To quote:
Merkusheva A. V.
Algorithm for two-phase scrembling on the basis of transforming the wavelet – mapping of speech signal by meanse of H – equivalent matrices // Information Security Problems. Computer Systems. 2002. № 3. DOI:Tomilin V. N.
To quote:
Tomilin V. N.
Usage of cell communications to create additional channels of secret information distribution // Information Security Problems. Computer Systems. 2002. № 3. DOI:Platonov V. V.
To quote:
Platonov V. V.
Firewall technology is base of network security systems // Information Security Problems. Computer Systems. 2002. № 3. DOI:Rostovtsev A. G. and Makhovenko E. B.
To quote:
Rostovtsev A. G. and Makhovenko E. B.
Cryptosystem based on category of isogenious elliptic curves // Information Security Problems. Computer Systems. 2002. № 3. DOI:Vus M. A.
To quote:
Vus M. A.
On the «Bases of information security and protection» special cours for humane students // Information Security Problems. Computer Systems. 2002. № 3. DOI:Zegzhda P. D., Kalinin M. O.
To quote:
Zegzhda P. D., Kalinin M. O.
Practices on artificial intelligence courses // Information Security Problems. Computer Systems. 2002. № 3. DOI:Talalueva M. A., Fisenko V. K.
To quote:
Talalueva M. A., Fisenko V. K.
Eveloping of interstate glossary of information security is about to happen // Information Security Problems. Computer Systems. 2002. № 4. DOI:Frolov D. B., Manoilo A. V., Veprintsev V. B.
To quote:
Frolov D. B., Manoilo A. V., Veprintsev V. B.
The particularies of information policy in the age of the information society // Information Security Problems. Computer Systems. 2002. № 4. DOI:Dmitriev I. L.
To quote:
Dmitriev I. L.
Analysis of modern public key infrastructure systems // Information Security Problems. Computer Systems. 2002. № 4. DOI:Vorobjev E. G.
To quote:
Vorobjev E. G.
The use of the polarization signals properties for increasing of radio communication systems stability against jamming // Information Security Problems. Computer Systems. 2002. № 4. DOI:Tarasov А. А.
To quote:
Tarasov А. А.
Tasks of maintenance of functional stability of computer systems // Information Security Problems. Computer Systems. 2002. № 4. DOI:Yashin A. I.
To quote:
Yashin A. I.
Simulation and representation of the allocated engineering systems’ geoinformation fields for an estimation and prediction of the information’s leakage variants // Information Security Problems. Computer Systems. 2002. № 4. DOI:Zegzhda D. P., Fimin M. D.
To quote:
Zegzhda D. P., Fimin M. D.
Inter-process communication in microkernel-based operating systems // Information Security Problems. Computer Systems. 2002. № 4. DOI:Kazennov V. N.
To quote:
Kazennov V. N.
Dynamical defence from DDOS-attacks on public WWW-server // Information Security Problems. Computer Systems. 2002. № 4. DOI:Kazennov V. N.
To quote:
Kazennov V. N.
Defence from DOS-attacks on statefull inspection firewalls // Information Security Problems. Computer Systems. 2002. № 4. DOI:Nekrasova Т. Р., Aksenova E. E.
To quote:
Nekrasova Т. Р., Aksenova E. E.
The peculiarities of the price formation policy for telecommunication companies // Information Security Problems. Computer Systems. 2002. № 4. DOI:Grigoriev V.R., Zyazin V. P., Kostsov E. G., Piskunov S. V.
To quote:
Grigoriev V.R., Zyazin V. P., Kostsov E. G., Piskunov S. V.
On the possibility of effective implementation of high-speed optoelectronic cryptomodules for the promising communication systems // Information Security Problems. Computer Systems. 2002. № 4. DOI:Nazarov A. N., Sikorsky A. B., Derkach E. I.
To quote:
Nazarov A. N., Sikorsky A. B., Derkach E. I.
Algorithms of uncryptographics protection information to delivery of reporting in cellular wireless communication system in conditions of radioelectronic reluctance // Information Security Problems. Computer Systems. 2002. № 4. DOI:Shtanko S. V., Ysko S. A.
To quote:
Shtanko S. V., Ysko S. A.
Features of information protection in information command and control system radiochannels with use of cryptographic protocols // Information Security Problems. Computer Systems. 2002. № 4. DOI: