Quarterly journal published in SPbPU
and edited by prof. Dmitry Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2025 year
  • 2024 year
  • 2023 year
  • 2022 year
  • 2021 year
  • 2020 year
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
    • № 1 2006
      • INFORMATION SECURITY APPLICATION

        Dudorov E. N.

        Applicability research of the neural-net analysis of system calls sequence in an expert system of programme operating modes recognition

        To quote:

        Dudorov E. N.

        Applicability research of the neural-net analysis of system calls sequence in an expert system of programme operating modes recognition // Information Security Problems. Computer Systems. 2006. № 1. Pp. 5-9. DOI:

        Pages:

        5-9

        Lysenko A. G.

        Malicious software for the mobile devices

        To quote:

        Lysenko A. G.

        Malicious software for the mobile devices // Information Security Problems. Computer Systems. 2006. № 1. Pp. 10-14. DOI:

        Pages:

        10-14
      • ЗАЩИЩЕННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ

        Zegzhda D. P.

        Secure hybrid operating system «Linux over Fenix»

        To quote:

        Zegzhda D. P.

        Secure hybrid operating system «Linux over Fenix» // Information Security Problems. Computer Systems. 2006. № 1. Pp. 15-25. DOI:

        Pages:

        15-25

        Zegzhda D. P., Kalinin M. O., Lysenko A. G., Moskvin D. A.

        The algorithmic model of access control in the Windows operating systems

        To quote:

        Zegzhda D. P., Kalinin M. O., Lysenko A. G., Moskvin D. A.

        The algorithmic model of access control in the Windows operating systems // Information Security Problems. Computer Systems. 2006. № 1. Pp. 26-29. DOI:

        Pages:

        26-29
      • APPLIED CRYPTOGRAPHY

        Denisenko M. P.

        In this article we consider the problem of proof the correctness of the cryptographic protocol of open key distribution. the approach to the soluion of his problem is based on technique «Strand spaces»

        To quote:

        Denisenko M. P.

        In this article we consider the problem of proof the correctness of the cryptographic protocol of open key distribution. the approach to the soluion of his problem is based on technique «Strand spaces» // Information Security Problems. Computer Systems. 2006. № 1. Pp. 30-39. DOI:

        Pages:

        30-39

        Kabanov Artem S.

        The theory of operation of final game models for an estimation of efficiency of protective systems on electronic keys

        To quote:

        Kabanov Artem S.

        The theory of operation of final game models for an estimation of efficiency of protective systems on electronic keys // Information Security Problems. Computer Systems. 2006. № 1. Pp. 40-43. DOI:

        Pages:

        40-43

        Kabanov Artem S.

        Technique of construction of models of protective systems on electronic keys with full overlap and estimation of their efficiency under the given models

        To quote:

        Kabanov Artem S.

        Technique of construction of models of protective systems on electronic keys with full overlap and estimation of their efficiency under the given models // Information Security Problems. Computer Systems. 2006. № 1. Pp. 44-50. DOI:

        Pages:

        44-50

        Yakovlev V. A., Korzhik V. I., Bakaev M. V.

        Key agreement protocols based on extractors under the conditions of noisy channel and active adversaries

        To quote:

        Yakovlev V. A., Korzhik V. I., Bakaev M. V.

        Key agreement protocols based on extractors under the conditions of noisy channel and active adversaries // Information Security Problems. Computer Systems. 2006. № 1. Pp. 51-67. DOI:

        Pages:

        51-67
    • № 2 2006
      • INFORMATION SECURITY ASPECTS

        Kotenko I. V., Stepashkin M. V., Bogdanov V. S.

        Architectures and models of active vulnerabilities analysis based on simulation of malefactors’ actions

        To quote:

        Kotenko I. V., Stepashkin M. V., Bogdanov V. S.

        Architectures and models of active vulnerabilities analysis based on simulation of malefactors’ actions // Information Security Problems. Computer Systems. 2006. № 2. Pp. 7-24. DOI:

        Pages:

        7-24

        Kriachko A. F., Nazarov A. V., Pantenkov A. P., Shinkevich A. S.

        The synthesis of intelligence systems-telemetering protection gears optimum composition on the basis of neural problem solving of combinatorial optimization

        To quote:

        Kriachko A. F., Nazarov A. V., Pantenkov A. P., Shinkevich A. S.

        The synthesis of intelligence systems-telemetering protection gears optimum composition on the basis of neural problem solving of combinatorial optimization // Information Security Problems. Computer Systems. 2006. № 2. Pp. 25-30. DOI:

        Pages:

        25-30
      • INFORMATION SECURITY APPLICATION

        Gryzunov V. V.

        Structure-functional synthesis of the model of intrusion prevention system

        To quote:

        Gryzunov V. V.

        Structure-functional synthesis of the model of intrusion prevention system // Information Security Problems. Computer Systems. 2006. № 2. Pp. 31-38. DOI:

        Pages:

        31-38

        Svirin I. S.

        The analytical method of the information representation quality assessment for the typical system behavior

        To quote:

        Svirin I. S.

        The analytical method of the information representation quality assessment for the typical system behavior // Information Security Problems. Computer Systems. 2006. № 2. Pp. 39-44. DOI:

        Pages:

        39-44
      • NETWORK AND TELECOMMUNICATION SECURITY

        Zegzhda D. P., Kovalenko S. L.

        Security issues of wireless networks IEEE 802.11a/b/g

        To quote:

        Zegzhda D. P., Kovalenko S. L.

        Security issues of wireless networks IEEE 802.11a/b/g // Information Security Problems. Computer Systems. 2006. № 2. Pp. 45-49. DOI:

        Pages:

        45-49

        Britov A. G., Mironchikov E. T.

        Redundancy in the information processes of data processing and security systems

        To quote:

        Britov A. G., Mironchikov E. T.

        Redundancy in the information processes of data processing and security systems // Information Security Problems. Computer Systems. 2006. № 2. Pp. 50-54. DOI:

        Pages:

        50-54
      • APPLIED CRYPTOGRAPHY

        Denisenko M. P.

        Technique «Strand spaces». Analysis of cryptographic protocols using authentication tests

        To quote:

        Denisenko M. P.

        Technique «Strand spaces». Analysis of cryptographic protocols using authentication tests // Information Security Problems. Computer Systems. 2006. № 2. Pp. 55-66. DOI:

        Pages:

        55-66

        Kabanov A. S.

        Estimation of hardening of protective systems on electronic keys operating partial encoding of the defended appendix

        To quote:

        Kabanov A. S.

        Estimation of hardening of protective systems on electronic keys operating partial encoding of the defended appendix // Information Security Problems. Computer Systems. 2006. № 2. Pp. 67-73. DOI:

        Pages:

        67-73

        Kryachko A. F., Silakov D. M.

        The video sequences data hiding

        To quote:

        Kryachko A. F., Silakov D. M.

        The video sequences data hiding // Information Security Problems. Computer Systems. 2006. № 2. Pp. 74-78. DOI:

        Pages:

        74-78

        Kuritsyn K. A.

        Modern quantum key distribution systems

        To quote:

        Kuritsyn K. A.

        Modern quantum key distribution systems // Information Security Problems. Computer Systems. 2006. № 2. Pp. 79-82. DOI:

        Pages:

        79-82
      • TECHNICAL SOLUTION

        Makarov S. B., Xue Wei

        Synthesis of band width efficient signals for the protected wireless telecommunication systems with the limited power resource

        To quote:

        Makarov S. B., Xue Wei

        Synthesis of band width efficient signals for the protected wireless telecommunication systems with the limited power resource // Information Security Problems. Computer Systems. 2006. № 2. Pp. 83-94. DOI:

        Pages:

        83-94

        Matveev А. V., Matveev V. V., Magulyan G. G.

        Safety of the automated control systems of objects of electric power industry from electromagnetic terrorism

        To quote:

        Matveev А. V., Matveev V. V., Magulyan G. G.

        Safety of the automated control systems of objects of electric power industry from electromagnetic terrorism // Information Security Problems. Computer Systems. 2006. № 2. Pp. 95-98. DOI:

        Pages:

        95-98
    • № 3 2006
      • INFORMATION SECURITY ASPECTS

        Zegzhda P. D., Kort S. S.

        Main modules of the host intrusion detection system

        To quote:

        Zegzhda P. D., Kort S. S.

        Main modules of the host intrusion detection system // Information Security Problems. Computer Systems. 2006. № 3. Pp. 7-16. DOI:

        Pages:

        7-16

        Sineshuk U. I., Markov O. N., Bondarenko I. V.

        Efficiency neural of optimization at forecasting the condition of information security of the automated system

        To quote:

        Sineshuk U. I., Markov O. N., Bondarenko I. V.

        Efficiency neural of optimization at forecasting the condition of information security of the automated system // Information Security Problems. Computer Systems. 2006. № 3. Pp. 17-20. DOI:

        Pages:

        17-20
      • NETWORK AND TELECOMMUNICATION SECURITY

        Baranov P. А.

        Anomaly detection based on the power of scattering characteristic analysis in a goodness-of-fit test

        To quote:

        Baranov P. А.

        Anomaly detection based on the power of scattering characteristic analysis in a goodness-of-fit test // Information Security Problems. Computer Systems. 2006. № 3. Pp. 21-29. DOI:

        Pages:

        21-29

        Julkov E. V., Platonov V. V.

        Modular approach to build neural networks for anomaly detection

        To quote:

        Julkov E. V., Platonov V. V.

        Modular approach to build neural networks for anomaly detection // Information Security Problems. Computer Systems. 2006. № 3. Pp. 30-34. DOI:

        Pages:

        30-34

        Zegzhda D. P., Kovalenko S. L.

        Security issues of storing passwords of wireless networks IEEE 802.11a/b/g in OS Windows XP

        To quote:

        Zegzhda D. P., Kovalenko S. L.

        Security issues of storing passwords of wireless networks IEEE 802.11a/b/g in OS Windows XP // Information Security Problems. Computer Systems. 2006. № 3. Pp. 35-37. DOI:

        Pages:

        35-37

        Lysenko A. G., Shevelkin A. U.

        Anomaly detection in hybrid networks

        To quote:

        Lysenko A. G., Shevelkin A. U.

        Anomaly detection in hybrid networks // Information Security Problems. Computer Systems. 2006. № 3. Pp. 38-42. DOI:

        Pages:

        38-42

        Ovchinnirjva E. V.

        Detection of anomalies on the base of dispersion distance computation

        To quote:

        Ovchinnirjva E. V.

        Detection of anomalies on the base of dispersion distance computation // Information Security Problems. Computer Systems. 2006. № 3. Pp. 43-47. DOI:

        Pages:

        43-47

        Ovchinnirjva E. V.

        Transformations of probabilistic suffix trees

        To quote:

        Ovchinnirjva E. V.

        Transformations of probabilistic suffix trees // Information Security Problems. Computer Systems. 2006. № 3. Pp. 48-54. DOI:

        Pages:

        48-54
      • INFORMATION SECURITY APPLICATION

        Zegzhda D. P., Korotich A. V.

        Control of access to information resources of multi-ties information systems

        To quote:

        Zegzhda D. P., Korotich A. V.

        Control of access to information resources of multi-ties information systems // Information Security Problems. Computer Systems. 2006. № 3. Pp. 55-61. DOI:

        Pages:

        55-61

        Markov O. N., Kusov E. V., Gvozdik J. M.

        Conformance evaluation of information security of audit objects to requirements of management directives

        To quote:

        Markov O. N., Kusov E. V., Gvozdik J. M.

        Conformance evaluation of information security of audit objects to requirements of management directives // Information Security Problems. Computer Systems. 2006. № 3. Pp. 62-71. DOI:

        Pages:

        62-71

        Rudina E. A.

        Role-based access control implementation for Windows 2000/XP

        To quote:

        Rudina E. A.

        Role-based access control implementation for Windows 2000/XP // Information Security Problems. Computer Systems. 2006. № 3. Pp. 72-77. DOI:

        Pages:

        72-77
      • APPLIED CRYPTOGRAPHY

        Dmitriev I. L.

        Authentication codes from perfect nonlinear function

        To quote:

        Dmitriev I. L.

        Authentication codes from perfect nonlinear function // Information Security Problems. Computer Systems. 2006. № 3. Pp. 78-83. DOI:

        Pages:

        78-83

        Dmitriev I. L.

        Computation of a message authentication code

        To quote:

        Dmitriev I. L.

        Computation of a message authentication code // Information Security Problems. Computer Systems. 2006. № 3. Pp. 84-88. DOI:

        Pages:

        84-88
      • TECHNICAL SOLUTION

        Kusov Е.

        Inspection ratio optimization

        To quote:

        Kusov Е.

        Inspection ratio optimization // Information Security Problems. Computer Systems. 2006. № 3. Pp. 89-94. DOI:

        Pages:

        89-94

        Matveev A. V., Bespalov D. S., Kopacheva M. V., Sinkovskja E. V.

        Consideration of psychological aspect in the model of threat to informational safety in management structure

        To quote:

        Matveev A. V., Bespalov D. S., Kopacheva M. V., Sinkovskja E. V.

        Consideration of psychological aspect in the model of threat to informational safety in management structure // Information Security Problems. Computer Systems. 2006. № 3. Pp. 95-98. DOI:

        Pages:

        95-98
      • EDUCATION PROBLEMS

        Gubin V., Kusov Е., Berezin A.

        Psychological conditions of professional characteristics forming in information security education

        To quote:

        Gubin V., Kusov Е., Berezin A.

        Psychological conditions of professional characteristics forming in information security education // Information Security Problems. Computer Systems. 2006. № 3. Pp. 99-106. DOI:

        Pages:

        99-106

        Suprun A. F., Ermilov V. V., Matveev V. V.

        Organisational and technical measures to protect special subjects studying process at the departments of military education

        To quote:

        Suprun A. F., Ermilov V. V., Matveev V. V.

        Organisational and technical measures to protect special subjects studying process at the departments of military education // Information Security Problems. Computer Systems. 2006. № 3. Pp. 107-111. DOI:

        Pages:

        107-111
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year