Quarterly journal published in SPbPU
and edited by prof. Dmitry Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2025 year
  • 2024 year
  • 2023 year
  • 2022 year
  • 2021 year
  • 2020 year
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
    • № 1 2008
      • INFORMATION SECURITY ASPECTS

        Kirsanov Y. G., Kisly N. G., Strekalov V. V.

        Methodical approach to nomenclature substantiation of term included in terminological standards on information protection

        To quote:

        Kirsanov Y. G., Kisly N. G., Strekalov V. V.

        Methodical approach to nomenclature substantiation of term included in terminological standards on information protection // Information Security Problems. Computer Systems. 2008. № 1. Pp. 7-12. DOI:

        Pages:

        7-12
      • NETWORK AND TELECOMMUNICATION SECURITY

        Bogdanov V. V., Sinadsky N. I.

        Complex computer attack intrusion detection algorithm based on signs obtained from formalized security policy statements using hierarchical fuzzy systems apparatus

        To quote:

        Bogdanov V. V., Sinadsky N. I.

        Complex computer attack intrusion detection algorithm based on signs obtained from formalized security policy statements using hierarchical fuzzy systems apparatus // Information Security Problems. Computer Systems. 2008. № 1. Pp. 13-26. DOI:

        Pages:

        13-26

        Kort S. S., Rudina E. A.

        The architecture of universal kernel of the monitoring and intrusion protection systems

        To quote:

        Kort S. S., Rudina E. A.

        The architecture of universal kernel of the monitoring and intrusion protection systems // Information Security Problems. Computer Systems. 2008. № 1. Pp. 27-39. DOI:

        Pages:

        27-39

        Nikiforov Y.  I., Svistunov S. G., Khomonenko A. D.

        Confidence of secret information leakage channels determination with help of stochastic algorithm

        To quote:

        Nikiforov Y.  I., Svistunov S. G., Khomonenko A. D.

        Confidence of secret information leakage channels determination with help of stochastic algorithm // Information Security Problems. Computer Systems. 2008. № 1. Pp. 40-43. DOI:

        Pages:

        40-43

        Petrenko S. A.

        Method of detection of computer attacks on the basis of similarity invarients

        To quote:

        Petrenko S. A.

        Method of detection of computer attacks on the basis of similarity invarients // Information Security Problems. Computer Systems. 2008. № 1. Pp. 44-47. DOI:

        Pages:

        44-47

        Savelyeva O. V.

        Access control methods of sessions of videoconferencing

        To quote:

        Savelyeva O. V.

        Access control methods of sessions of videoconferencing // Information Security Problems. Computer Systems. 2008. № 1. Pp. 48-52. DOI:

        Pages:

        48-52

        Starobinec D. U., Vorobiev E. G.

        Protection of the information in corporate computer networks on the basis of address representation transferred messages

        To quote:

        Starobinec D. U., Vorobiev E. G.

        Protection of the information in corporate computer networks on the basis of address representation transferred messages // Information Security Problems. Computer Systems. 2008. № 1. Pp. 53-56. DOI:

        Pages:

        53-56
      • APPLIED CRYPTOGRAPHY

        Andrushchenko D. M., Kozina G. L., Piza D. M.

        Practical estimation of asymmetric cryptosystem security

        To quote:

        Andrushchenko D. M., Kozina G. L., Piza D. M.

        Practical estimation of asymmetric cryptosystem security // Information Security Problems. Computer Systems. 2008. № 1. Pp. 57-62. DOI:

        Pages:

        57-62

        Korzhik V. I., Zubarev M. A.

        Distortion free exact authentiation of bkinary images

        To quote:

        Korzhik V. I., Zubarev M. A.

        Distortion free exact authentiation of bkinary images // Information Security Problems. Computer Systems. 2008. № 1. Pp. 63-69. DOI:

        Pages:

        63-69

        Rostovtsev A. G.

        On polynominal interpolation of maps of sets of pn elements

        To quote:

        Rostovtsev A. G.

        On polynominal interpolation of maps of sets of pn elements // Information Security Problems. Computer Systems. 2008. № 1. Pp. 70-78. DOI:

        Pages:

        70-78

        Stolbunov A. G.

        Towards the provable security of isogeny cryptosystems

        To quote:

        Stolbunov A. G.

        Towards the provable security of isogeny cryptosystems // Information Security Problems. Computer Systems. 2008. № 1. Pp. 79-87. DOI:

        Pages:

        79-87

        Yakovlev V., Shutyy R.

        Modified bit commitment protocol for unfair noisy channel

        To quote:

        Yakovlev V., Shutyy R.

        Modified bit commitment protocol for unfair noisy channel // Information Security Problems. Computer Systems. 2008. № 1. Pp. 88-95. DOI:

        Pages:

        88-95
      • TECHNICAL SOLUTION

        Vishnevskiy U. G., Sikarev I. A.

        Electromagnetic zaschischennost satellite channels of digital information systems radionavigatsionnyh

        To quote:

        Vishnevskiy U. G., Sikarev I. A.

        Electromagnetic zaschischennost satellite channels of digital information systems radionavigatsionnyh // Information Security Problems. Computer Systems. 2008. № 1. Pp. 96-100. DOI:

        Pages:

        96-100
      • INFORMATION SECURITY APPLICATION

        Petigin A. F., Miroshnikov P. V.

        Basic input-output system protection providing safety boot

        To quote:

        Petigin A. F., Miroshnikov P. V.

        Basic input-output system protection providing safety boot // Information Security Problems. Computer Systems. 2008. № 1. Pp. 101-105. DOI:

        Pages:

        101-105
    • № 2 2008
      • INFORMATION SECURITY ASPECTS

        Lysenko A. G.

        Information systems security modelling based on the risks description lanuage

        To quote:

        Lysenko A. G.

        Information systems security modelling based on the risks description lanuage // Information Security Problems. Computer Systems. 2008. № 2. Pp. 7-14. DOI:

        Pages:

        7-14

        Skiba V. Y.

        Timed algebraic Petri nets

        To quote:

        Skiba V. Y.

        Timed algebraic Petri nets // Information Security Problems. Computer Systems. 2008. № 2. Pp. 15-22. DOI:

        Pages:

        15-22
      • INFORMATION SECURITY APPLICATION

        Baranov A. P., Baranov P. A.

        The main issues of creation and development of modern secured operating systems

        To quote:

        Baranov A. P., Baranov P. A.

        The main issues of creation and development of modern secured operating systems // Information Security Problems. Computer Systems. 2008. № 2. Pp. 23-26. DOI:

        Pages:

        23-26

        Arhipochkin E. V.

        Integrity providing system for computer-based systems with DBMS. Architecture and intercomponent communication

        To quote:

        Arhipochkin E. V.

        Integrity providing system for computer-based systems with DBMS. Architecture and intercomponent communication // Information Security Problems. Computer Systems. 2008. № 2. Pp. 27-38. DOI:

        Pages:

        27-38

        Dudorov E. N.

        Technology SADT «Structured analysis and design technique» as the tool of simulation of illegal operations in sphere of the computer information and a resource of databases structures designing

        To quote:

        Dudorov E. N.

        Technology SADT «Structured analysis and design technique» as the tool of simulation of illegal operations in sphere of the computer information and a resource of databases structures designing // Information Security Problems. Computer Systems. 2008. № 2. Pp. 39-43. DOI:

        Pages:

        39-43
      • NETWORK AND TELECOMMUNICATION SECURITY

        Ankudinov P. V.

        Intrusion detection with feedback

        To quote:

        Ankudinov P. V.

        Intrusion detection with feedback // Information Security Problems. Computer Systems. 2008. № 2. Pp. 44-47. DOI:

        Pages:

        44-47

        Petrenko S. A., Beliaev A. V.

        The comparative analysis of methods of detection of computer attacks

        To quote:

        Petrenko S. A., Beliaev A. V.

        The comparative analysis of methods of detection of computer attacks // Information Security Problems. Computer Systems. 2008. № 2. Pp. 48-53. DOI:

        Pages:

        48-53
      • APPLIED CRYPTOGRAPHY

        Arkhangelskaya A. V., Arkhangelskii V. G.

        An approach to high-speed random bit generator, based on quantum process intensity measuring

        To quote:

        Arkhangelskaya A. V., Arkhangelskii V. G.

        An approach to high-speed random bit generator, based on quantum process intensity measuring // Information Security Problems. Computer Systems. 2008. № 2. Pp. 54-64. DOI:

        Pages:

        54-64

        Burov I. N., Mironchikov E. T.

        Secret sharing schemes for identification of cheaters

        To quote:

        Burov I. N., Mironchikov E. T.

        Secret sharing schemes for identification of cheaters // Information Security Problems. Computer Systems. 2008. № 2. Pp. 65-70. DOI:

        Pages:

        65-70

        Vorobiev E. G.

        Synthesis of the quantum report of transfer on the basis of model pseudo-casual sequences- polarizing modulation of the signal

        To quote:

        Vorobiev E. G.

        Synthesis of the quantum report of transfer on the basis of model pseudo-casual sequences- polarizing modulation of the signal // Information Security Problems. Computer Systems. 2008. № 2. Pp. 71-75. DOI:

        Pages:

        71-75

        Samokhina M. A.

        Cryptosystems based on linear codes

        To quote:

        Samokhina M. A.

        Cryptosystems based on linear codes // Information Security Problems. Computer Systems. 2008. № 2. Pp. 76-83. DOI:

        Pages:

        76-83
      • SPECIAL IT

        Baranov Y. A.

        Statistical independence in models of processing in AIS texts

        To quote:

        Baranov Y. A.

        Statistical independence in models of processing in AIS texts // Information Security Problems. Computer Systems. 2008. № 2. Pp. 84-91. DOI:

        Pages:

        84-91

        Gluhov A. A., Klyahin V. N., Sinkovskaya E. V.

        Providing information security products for testing special-purpose

        To quote:

        Gluhov A. A., Klyahin V. N., Sinkovskaya E. V.

        Providing information security products for testing special-purpose // Information Security Problems. Computer Systems. 2008. № 2. Pp. 92-96. DOI:

        Pages:

        92-96

        Petuhov U. V., Sikarev I. A.

        Electromagnetic security base stations river automated information systems in mutual interference

        To quote:

        Petuhov U. V., Sikarev I. A.

        Electromagnetic security base stations river automated information systems in mutual interference // Information Security Problems. Computer Systems. 2008. № 2. Pp. 97-100. DOI:

        Pages:

        97-100
    • № 3 2008
      • INFORMATION SECURITY APPLICATION

        Danilenko A. U.

        Completion of information management systems for provision of required level of data protection

        To quote:

        Danilenko A. U.

        Completion of information management systems for provision of required level of data protection // Information Security Problems. Computer Systems. 2008. № 3. Pp. 7-13. DOI:

        Pages:

        7-13

        Husni, Afanasyev S. V.

        Architecture and modeling honeynet

        To quote:

        Husni, Afanasyev S. V.

        Architecture and modeling honeynet // Information Security Problems. Computer Systems. 2008. № 3. Pp. 14-21. DOI:

        Pages:

        14-21
      • ЗАЩИЩЁННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ И ДОВЕРЕННАЯ СРЕДА

        Molodchenko J. A., Sotov L. S., Harin V. N.

        About formation of the entrusted environment of server control systems by databases

        To quote:

        Molodchenko J. A., Sotov L. S., Harin V. N.

        About formation of the entrusted environment of server control systems by databases // Information Security Problems. Computer Systems. 2008. № 3. Pp. 22-26. DOI:

        Pages:

        22-26
      • БЕЗОПАСНОСТЬ РАСПРЕДЕЛЁННЫХ СИСТЕМ И ТЕЛЕКОММУНИКАЦИЙ

        Petrenko S. A., Beliaev A. V.

        Method of detection of not authorized copying Ethernet-traffic

        To quote:

        Petrenko S. A., Beliaev A. V.

        Method of detection of not authorized copying Ethernet-traffic // Information Security Problems. Computer Systems. 2008. № 3. Pp. 27-31. DOI:

        Pages:

        27-31
      • SPECIAL IT

        Baranov Y. A.

        Using of dissimilar polynomial schemes in automatic rubrication

        To quote:

        Baranov Y. A.

        Using of dissimilar polynomial schemes in automatic rubrication // Information Security Problems. Computer Systems. 2008. № 3. Pp. 32-47. DOI:

        Pages:

        32-47
      • SOFTWARE SECURITY

        Dolgova K. N., Chernov A. V., Derevenets E. O.

        Methods and algorithms for reconstructing programs from assembly to high level language

        To quote:

        Dolgova K. N., Chernov A. V., Derevenets E. O.

        Methods and algorithms for reconstructing programs from assembly to high level language // Information Security Problems. Computer Systems. 2008. № 3. Pp. 48-62. DOI:

        Pages:

        48-62

        Dudorov E. N.

        Behaviour a the analysis of applications in the computing environment in interests of the software hidden information effect revealing

        To quote:

        Dudorov E. N.

        Behaviour a the analysis of applications in the computing environment in interests of the software hidden information effect revealing // Information Security Problems. Computer Systems. 2008. № 3. Pp. 63-65. DOI:

        Pages:

        63-65

        Tihonov A. U., Avetisyan A. I., Padaryan V. A.

        Methodology of exploring of an algorithm from binary code by dynamic analisys

        To quote:

        Tihonov A. U., Avetisyan A. I., Padaryan V. A.

        Methodology of exploring of an algorithm from binary code by dynamic analisys // Information Security Problems. Computer Systems. 2008. № 3. Pp. 66-71. DOI:

        Pages:

        66-71

        Usupov R.M., Tokhtabaev A., Skormin V., Dolgikh A., Tukeev U., Altaibek А.

        Detection of worm propagation engines in the system call domain using colored Petri nets

        To quote:

        Usupov R.M., Tokhtabaev A., Skormin V., Dolgikh A., Tukeev U., Altaibek А.

        Detection of worm propagation engines in the system call domain using colored Petri nets // Information Security Problems. Computer Systems. 2008. № 3. Pp. 72-88. DOI:

        Pages:

        72-88
    • № 4 2008
      • INFORMATION SECURITY APPLICATION

        Burenin P. V.

        DP-mоdel of file systems

        To quote:

        Burenin P. V.

        DP-mоdel of file systems // Information Security Problems. Computer Systems. 2008. № 4. Pp. 7-17. DOI:

        Pages:

        7-17

        Gorkovenko E. V., Sokolova S. P.

        The organization of the system with mandate politics of information security

        To quote:

        Gorkovenko E. V., Sokolova S. P.

        The organization of the system with mandate politics of information security // Information Security Problems. Computer Systems. 2008. № 4. Pp. 18-27. DOI:

        Pages:

        18-27

        Sobolev S. S., Sotov L. S., Kharin V. N.

        Dynamic formatting of structural objects of storehouses of data

        To quote:

        Sobolev S. S., Sotov L. S., Kharin V. N.

        Dynamic formatting of structural objects of storehouses of data // Information Security Problems. Computer Systems. 2008. № 4. Pp. 28-33. DOI:

        Pages:

        28-33
      • SECURE OPERATING SYSTEMS AND TRUSTED ENVIRONMENT

        Yavno D. M.

        On inadequacy of built-in protection against rootkits in Microsoft Windows x64 operating systems

        To quote:

        Yavno D. M.

        On inadequacy of built-in protection against rootkits in Microsoft Windows x64 operating systems // Information Security Problems. Computer Systems. 2008. № 4. Pp. 34-40. DOI:

        Pages:

        34-40
      • APPLIED CRYPTOGRAPHY

        Baranov A. P., Akimov S. L., Bodrov A. G.

        Cryptographic tools for the protection of personal data

        To quote:

        Baranov A. P., Akimov S. L., Bodrov A. G.

        Cryptographic tools for the protection of personal data // Information Security Problems. Computer Systems. 2008. № 4. Pp. 41-47. DOI:

        Pages:

        41-47

        Kharinov M. V., Zabolotsky V. P.

        Virtual memory image model in application to document protection

        To quote:

        Kharinov M. V., Zabolotsky V. P.

        Virtual memory image model in application to document protection // Information Security Problems. Computer Systems. 2008. № 4. Pp. 48-55. DOI:

        Pages:

        48-55
      • NETWORK AND TELECOMMUNICATION SECURITY

        Rudina E. А.

        The generalized notion of network protocols

        To quote:

        Rudina E. А.

        The generalized notion of network protocols // Information Security Problems. Computer Systems. 2008. № 4. Pp. 56-60. DOI:

        Pages:

        56-60
      • TECHNICAL SOLUTION

        Sikarev A. A., Sikarev I. A.

        Functional stability of the basic characteristics automated identification systems on inland waterways

        To quote:

        Sikarev A. A., Sikarev I. A.

        Functional stability of the basic characteristics automated identification systems on inland waterways // Information Security Problems. Computer Systems. 2008. № 4. Pp. 61-65. DOI:

        Pages:

        61-65
      • SOFTWARE SECURITY

        Belyakov I. A., Eremeev M. A.

        The approach to construction of the subsystem of decision-making on presence/absence of not declared possibilities in the certificated software on the basis of the data of the static analysis

        To quote:

        Belyakov I. A., Eremeev M. A.

        The approach to construction of the subsystem of decision-making on presence/absence of not declared possibilities in the certificated software on the basis of the data of the static analysis // Information Security Problems. Computer Systems. 2008. № 4. Pp. 66-72. DOI:

        Pages:

        66-72
      • EDUCATION PROBLEMS

        Pleshkevich E. A.

        The review on the text-book «Documents management» (Authors: E. A. Bardaev, V. B. Kravchenko)

        To quote:

        Pleshkevich E. A.

        The review on the text-book «Documents management» (Authors: E. A. Bardaev, V. B. Kravchenko) // Information Security Problems. Computer Systems. 2008. № 4. Pp. 73-78. DOI:

        Pages:

        73-78
  • 2007 year
  • 2006 year
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year