Kirsanov Y. G., Kisly N. G., Strekalov V. V.
To quote:
Kirsanov Y. G., Kisly N. G., Strekalov V. V.
Methodical approach to nomenclature substantiation of term included in terminological standards on information protection // Information Security Problems. Computer Systems. 2008. № 1. Pp. 7-12. DOI:Pages:
7-12Bogdanov V. V., Sinadsky N. I.
To quote:
Bogdanov V. V., Sinadsky N. I.
Complex computer attack intrusion detection algorithm based on signs obtained from formalized security policy statements using hierarchical fuzzy systems apparatus // Information Security Problems. Computer Systems. 2008. № 1. Pp. 13-26. DOI:Pages:
13-26Kort S. S., Rudina E. A.
To quote:
Kort S. S., Rudina E. A.
The architecture of universal kernel of the monitoring and intrusion protection systems // Information Security Problems. Computer Systems. 2008. № 1. Pp. 27-39. DOI:Pages:
27-39Nikiforov Y. I., Svistunov S. G., Khomonenko A. D.
To quote:
Nikiforov Y. I., Svistunov S. G., Khomonenko A. D.
Confidence of secret information leakage channels determination with help of stochastic algorithm // Information Security Problems. Computer Systems. 2008. № 1. Pp. 40-43. DOI:Pages:
40-43Petrenko S. A.
To quote:
Petrenko S. A.
Method of detection of computer attacks on the basis of similarity invarients // Information Security Problems. Computer Systems. 2008. № 1. Pp. 44-47. DOI:Pages:
44-47Savelyeva O. V.
To quote:
Savelyeva O. V.
Access control methods of sessions of videoconferencing // Information Security Problems. Computer Systems. 2008. № 1. Pp. 48-52. DOI:Pages:
48-52Starobinec D. U., Vorobiev E. G.
To quote:
Starobinec D. U., Vorobiev E. G.
Protection of the information in corporate computer networks on the basis of address representation transferred messages // Information Security Problems. Computer Systems. 2008. № 1. Pp. 53-56. DOI:Pages:
53-56Andrushchenko D. M., Kozina G. L., Piza D. M.
To quote:
Andrushchenko D. M., Kozina G. L., Piza D. M.
Practical estimation of asymmetric cryptosystem security // Information Security Problems. Computer Systems. 2008. № 1. Pp. 57-62. DOI:Pages:
57-62Korzhik V. I., Zubarev M. A.
To quote:
Korzhik V. I., Zubarev M. A.
Distortion free exact authentiation of bkinary images // Information Security Problems. Computer Systems. 2008. № 1. Pp. 63-69. DOI:Pages:
63-69Rostovtsev A. G.
To quote:
Rostovtsev A. G.
On polynominal interpolation of maps of sets of pn elements // Information Security Problems. Computer Systems. 2008. № 1. Pp. 70-78. DOI:Pages:
70-78Stolbunov A. G.
To quote:
Stolbunov A. G.
Towards the provable security of isogeny cryptosystems // Information Security Problems. Computer Systems. 2008. № 1. Pp. 79-87. DOI:Pages:
79-87Yakovlev V., Shutyy R.
To quote:
Yakovlev V., Shutyy R.
Modified bit commitment protocol for unfair noisy channel // Information Security Problems. Computer Systems. 2008. № 1. Pp. 88-95. DOI:Pages:
88-95Vishnevskiy U. G., Sikarev I. A.
To quote:
Vishnevskiy U. G., Sikarev I. A.
Electromagnetic zaschischennost satellite channels of digital information systems radionavigatsionnyh // Information Security Problems. Computer Systems. 2008. № 1. Pp. 96-100. DOI:Pages:
96-100Petigin A. F., Miroshnikov P. V.
To quote:
Petigin A. F., Miroshnikov P. V.
Basic input-output system protection providing safety boot // Information Security Problems. Computer Systems. 2008. № 1. Pp. 101-105. DOI:Pages:
101-105Lysenko A. G.
To quote:
Lysenko A. G.
Information systems security modelling based on the risks description lanuage // Information Security Problems. Computer Systems. 2008. № 2. Pp. 7-14. DOI:Pages:
7-14Skiba V. Y.
To quote:
Skiba V. Y.
Timed algebraic Petri nets // Information Security Problems. Computer Systems. 2008. № 2. Pp. 15-22. DOI:Pages:
15-22Baranov A. P., Baranov P. A.
To quote:
Baranov A. P., Baranov P. A.
The main issues of creation and development of modern secured operating systems // Information Security Problems. Computer Systems. 2008. № 2. Pp. 23-26. DOI:Pages:
23-26Arhipochkin E. V.
To quote:
Arhipochkin E. V.
Integrity providing system for computer-based systems with DBMS. Architecture and intercomponent communication // Information Security Problems. Computer Systems. 2008. № 2. Pp. 27-38. DOI:Pages:
27-38Dudorov E. N.
To quote:
Dudorov E. N.
Technology SADT «Structured analysis and design technique» as the tool of simulation of illegal operations in sphere of the computer information and a resource of databases structures designing // Information Security Problems. Computer Systems. 2008. № 2. Pp. 39-43. DOI:Pages:
39-43Ankudinov P. V.
To quote:
Ankudinov P. V.
Intrusion detection with feedback // Information Security Problems. Computer Systems. 2008. № 2. Pp. 44-47. DOI:Pages:
44-47Petrenko S. A., Beliaev A. V.
To quote:
Petrenko S. A., Beliaev A. V.
The comparative analysis of methods of detection of computer attacks // Information Security Problems. Computer Systems. 2008. № 2. Pp. 48-53. DOI:Pages:
48-53Arkhangelskaya A. V., Arkhangelskii V. G.
To quote:
Arkhangelskaya A. V., Arkhangelskii V. G.
An approach to high-speed random bit generator, based on quantum process intensity measuring // Information Security Problems. Computer Systems. 2008. № 2. Pp. 54-64. DOI:Pages:
54-64Burov I. N., Mironchikov E. T.
To quote:
Burov I. N., Mironchikov E. T.
Secret sharing schemes for identification of cheaters // Information Security Problems. Computer Systems. 2008. № 2. Pp. 65-70. DOI:Pages:
65-70Vorobiev E. G.
To quote:
Vorobiev E. G.
Synthesis of the quantum report of transfer on the basis of model pseudo-casual sequences- polarizing modulation of the signal // Information Security Problems. Computer Systems. 2008. № 2. Pp. 71-75. DOI:Pages:
71-75Samokhina M. A.
To quote:
Samokhina M. A.
Cryptosystems based on linear codes // Information Security Problems. Computer Systems. 2008. № 2. Pp. 76-83. DOI:Pages:
76-83Baranov Y. A.
To quote:
Baranov Y. A.
Statistical independence in models of processing in AIS texts // Information Security Problems. Computer Systems. 2008. № 2. Pp. 84-91. DOI:Pages:
84-91Gluhov A. A., Klyahin V. N., Sinkovskaya E. V.
To quote:
Gluhov A. A., Klyahin V. N., Sinkovskaya E. V.
Providing information security products for testing special-purpose // Information Security Problems. Computer Systems. 2008. № 2. Pp. 92-96. DOI:Pages:
92-96Petuhov U. V., Sikarev I. A.
To quote:
Petuhov U. V., Sikarev I. A.
Electromagnetic security base stations river automated information systems in mutual interference // Information Security Problems. Computer Systems. 2008. № 2. Pp. 97-100. DOI:Pages:
97-100Danilenko A. U.
To quote:
Danilenko A. U.
Completion of information management systems for provision of required level of data protection // Information Security Problems. Computer Systems. 2008. № 3. Pp. 7-13. DOI:Pages:
7-13Husni, Afanasyev S. V.
To quote:
Husni, Afanasyev S. V.
Architecture and modeling honeynet // Information Security Problems. Computer Systems. 2008. № 3. Pp. 14-21. DOI:Pages:
14-21Molodchenko J. A., Sotov L. S., Harin V. N.
To quote:
Molodchenko J. A., Sotov L. S., Harin V. N.
About formation of the entrusted environment of server control systems by databases // Information Security Problems. Computer Systems. 2008. № 3. Pp. 22-26. DOI:Pages:
22-26Petrenko S. A., Beliaev A. V.
To quote:
Petrenko S. A., Beliaev A. V.
Method of detection of not authorized copying Ethernet-traffic // Information Security Problems. Computer Systems. 2008. № 3. Pp. 27-31. DOI:Pages:
27-31Baranov Y. A.
To quote:
Baranov Y. A.
Using of dissimilar polynomial schemes in automatic rubrication // Information Security Problems. Computer Systems. 2008. № 3. Pp. 32-47. DOI:Pages:
32-47Dolgova K. N., Chernov A. V., Derevenets E. O.
To quote:
Dolgova K. N., Chernov A. V., Derevenets E. O.
Methods and algorithms for reconstructing programs from assembly to high level language // Information Security Problems. Computer Systems. 2008. № 3. Pp. 48-62. DOI:Pages:
48-62Dudorov E. N.
To quote:
Dudorov E. N.
Behaviour a the analysis of applications in the computing environment in interests of the software hidden information effect revealing // Information Security Problems. Computer Systems. 2008. № 3. Pp. 63-65. DOI:Pages:
63-65Tihonov A. U., Avetisyan A. I., Padaryan V. A.
To quote:
Tihonov A. U., Avetisyan A. I., Padaryan V. A.
Methodology of exploring of an algorithm from binary code by dynamic analisys // Information Security Problems. Computer Systems. 2008. № 3. Pp. 66-71. DOI:Pages:
66-71Usupov R.M., Tokhtabaev A., Skormin V., Dolgikh A., Tukeev U., Altaibek А.
To quote:
Usupov R.M., Tokhtabaev A., Skormin V., Dolgikh A., Tukeev U., Altaibek А.
Detection of worm propagation engines in the system call domain using colored Petri nets // Information Security Problems. Computer Systems. 2008. № 3. Pp. 72-88. DOI:Pages:
72-88Burenin P. V.
To quote:
Burenin P. V.
DP-mоdel of file systems // Information Security Problems. Computer Systems. 2008. № 4. Pp. 7-17. DOI:Pages:
7-17Gorkovenko E. V., Sokolova S. P.
To quote:
Gorkovenko E. V., Sokolova S. P.
The organization of the system with mandate politics of information security // Information Security Problems. Computer Systems. 2008. № 4. Pp. 18-27. DOI:Pages:
18-27Sobolev S. S., Sotov L. S., Kharin V. N.
To quote:
Sobolev S. S., Sotov L. S., Kharin V. N.
Dynamic formatting of structural objects of storehouses of data // Information Security Problems. Computer Systems. 2008. № 4. Pp. 28-33. DOI:Pages:
28-33Yavno D. M.
To quote:
Yavno D. M.
On inadequacy of built-in protection against rootkits in Microsoft Windows x64 operating systems // Information Security Problems. Computer Systems. 2008. № 4. Pp. 34-40. DOI:Pages:
34-40Baranov A. P., Akimov S. L., Bodrov A. G.
To quote:
Baranov A. P., Akimov S. L., Bodrov A. G.
Cryptographic tools for the protection of personal data // Information Security Problems. Computer Systems. 2008. № 4. Pp. 41-47. DOI:Pages:
41-47Kharinov M. V., Zabolotsky V. P.
To quote:
Kharinov M. V., Zabolotsky V. P.
Virtual memory image model in application to document protection // Information Security Problems. Computer Systems. 2008. № 4. Pp. 48-55. DOI:Pages:
48-55Rudina E. А.
To quote:
Rudina E. А.
The generalized notion of network protocols // Information Security Problems. Computer Systems. 2008. № 4. Pp. 56-60. DOI:Pages:
56-60Sikarev A. A., Sikarev I. A.
To quote:
Sikarev A. A., Sikarev I. A.
Functional stability of the basic characteristics automated identification systems on inland waterways // Information Security Problems. Computer Systems. 2008. № 4. Pp. 61-65. DOI:Pages:
61-65Belyakov I. A., Eremeev M. A.
To quote:
Belyakov I. A., Eremeev M. A.
The approach to construction of the subsystem of decision-making on presence/absence of not declared possibilities in the certificated software on the basis of the data of the static analysis // Information Security Problems. Computer Systems. 2008. № 4. Pp. 66-72. DOI:Pages:
66-72Pleshkevich E. A.
To quote:
Pleshkevich E. A.
The review on the text-book «Documents management» (Authors: E. A. Bardaev, V. B. Kravchenko) // Information Security Problems. Computer Systems. 2008. № 4. Pp. 73-78. DOI:Pages:
73-78