Tregubov A. G.
To quote:
Tregubov A. G.
AI in systems of defence // Information Security Problems. Computer Systems. 2007. № 1. Pp. 7-10. DOI:Pages:
7-10Baranov A. P.
To quote:
Baranov A. P.
Practical experience of foreign products’ application in secure information systems // Information Security Problems. Computer Systems. 2007. № 1. Pp. 11-14. DOI:Pages:
11-14Kriachko A. F., Nazarov A. V., Pantenkov A. P. Shinkevich A. S.
To quote:
Kriachko A. F., Nazarov A. V., Pantenkov A. P. Shinkevich A. S.
Synthesis algorithm of the intelligence systems-telemetering protection means based on the navigation of the most probable itinerary of implementation vulnerability // Information Security Problems. Computer Systems. 2007. № 1. Pp. 15-20. DOI:Pages:
15-20Kabanov A. S.
To quote:
Kabanov A. S.
Estimation of hardening of protective systems on electronic keys operating the gear the inquiry – answer, without encoding the defended appendix // Information Security Problems. Computer Systems. 2007. № 1. Pp. 21-26. DOI:Pages:
21-26Kabanov A. S.
To quote:
Kabanov A. S.
Usage of the zero knowledge protocols for protective systems on electronic keys // Information Security Problems. Computer Systems. 2007. № 1. Pp. 27-33. DOI:Pages:
27-33Rostovtsev A. G.
To quote:
Rostovtsev A. G.
Generation of imaginary quadratic orders with given class subgroup // Information Security Problems. Computer Systems. 2007. № 1. Pp. 34-40. DOI:Pages:
34-40Rostovtsev A. G.
To quote:
Rostovtsev A. G.
On 2-adic method of hash-function inverting // Information Security Problems. Computer Systems. 2007. № 1. Pp. 41-47. DOI:Pages:
41-47Baranov P. A.
To quote:
Baranov P. A.
Classification of software characteristics used for anomaly detection // Information Security Problems. Computer Systems. 2007. № 1. Pp. 48-54. DOI:Pages:
48-54Kort S. S., Nemchaninov A. A.
To quote:
Kort S. S., Nemchaninov A. A.
Intrusion detection system with context consideration // Information Security Problems. Computer Systems. 2007. № 1. Pp. 55-59. DOI:Pages:
55-59Zegzhda P. D.
To quote:
Zegzhda P. D.
General trends of information security technologies evolution in the epoch of information warfare // Information Security Problems. Computer Systems. 2007. № 1. Pp. 60-72. DOI:Pages:
60-72Volvenko S. V., Makarov S. B.
To quote:
Volvenko S. V., Makarov S. B.
Simulation model of meteor burst communications system // Information Security Problems. Computer Systems. 2007. № 1. Pp. 73-85. DOI:Pages:
73-85Dudorov E. N., Pravikov D. I.
To quote:
Dudorov E. N., Pravikov D. I.
Determinacy analysis a method of discernment of offences in the computer information ORB // Information Security Problems. Computer Systems. 2007. № 2. Pp. 7-10. DOI:Pages:
7-10Kopanitsa George, Mescheriakov Roman
To quote:
Kopanitsa George, Mescheriakov Roman
Application of decidable modal formalism for the estimation of information security // Information Security Problems. Computer Systems. 2007. № 2. Pp. 11-15. DOI:Pages:
11-15Tenetko M. I., Peskova O. Y.
To quote:
Tenetko M. I., Peskova O. Y.
Representation of informational risks in the form of fuzzy semantic network // Information Security Problems. Computer Systems. 2007. № 2. Pp. 16-19. DOI:Pages:
16-19Abdulmanov R. A., Zegzhda P. D., Kalinin M. O.
To quote:
Abdulmanov R. A., Zegzhda P. D., Kalinin M. O.
Security settings influence on the risk analysis in secure information systems // Information Security Problems. Computer Systems. 2007. № 2. Pp. 20-26. DOI:Pages:
20-26Avramenko V. S.
To quote:
Avramenko V. S.
Estimation methods of the information security from not authorized access in conditions of the fuzzy data // Information Security Problems. Computer Systems. 2007. № 2. Pp. 27-31. DOI:Pages:
27-31Moskvin D. A., Kalinin M. O.
To quote:
Moskvin D. A., Kalinin M. O.
A calculation of the optimum security configuration in Windows // Information Security Problems. Computer Systems. 2007. № 2. Pp. 32-38. DOI:Pages:
32-38Platonov V. V., Teimurov V. A.
To quote:
Platonov V. V., Teimurov V. A.
Bytecode instrumentation // Information Security Problems. Computer Systems. 2007. № 2. Pp. 39-43. DOI:Pages:
39-43Savelyeva O. V., Platonov V. V.
To quote:
Savelyeva O. V., Platonov V. V.
Methods of niching in intrusion detection systems // Information Security Problems. Computer Systems. 2007. № 2. Pp. 44-49. DOI:Pages:
44-49Fedoseyev V.
To quote:
Fedoseyev V.
Paradigm change in access control // Information Security Problems. Computer Systems. 2007. № 2. Pp. 50-57. DOI:Pages:
50-57Grusho A. A., Grusho N. A., Timonina E. E.
To quote:
Grusho A. A., Grusho N. A., Timonina E. E.
Some applications of data hiding and secure data hiding methods // Information Security Problems. Computer Systems. 2007. № 2. Pp. 58-63. DOI:Pages:
58-63Ivashko A. M.
To quote:
Ivashko A. M.
A model of computer for security requirements impementation analysis // Information Security Problems. Computer Systems. 2007. № 2. Pp. 64-71. DOI:Pages:
64-71Sinjuk A. D.
To quote:
Sinjuk A. D.
Potential conditions estimation of key sharing based on noiseless public channels // Information Security Problems. Computer Systems. 2007. № 2. Pp. 72-82. DOI:Pages:
72-82Shadrin O. S.
To quote:
Shadrin O. S.
Using cyclotomic fields in number field sieve for discrete logarithms // Information Security Problems. Computer Systems. 2007. № 2. Pp. 83-87. DOI:Pages:
83-87Shtanko S. V.
To quote:
Shtanko S. V.
Combined information security algorithm based on elliptic curves mathematical tool // Information Security Problems. Computer Systems. 2007. № 2. Pp. 88-94. DOI:Pages:
88-94Shlyakhin V. M., Shlyakhin A. V.
To quote:
Shlyakhin V. M., Shlyakhin A. V.
Peculiarities of conflict modeling under conditions of unauthorized access // Information Security Problems. Computer Systems. 2007. № 2. Pp. 95-99. DOI:Pages:
95-99Lysenko A. G.
To quote:
Lysenko A. G.
Risks analysis of the information security violation in networks with mobile segments // Information Security Problems. Computer Systems. 2007. № 2. Pp. 100-104. DOI:Pages:
100-104Nazarov I. O.
To quote:
Nazarov I. O.
The web-systems safety analysis in cross-site scripting class vulnerability realization conditions // Information Security Problems. Computer Systems. 2007. № 2. Pp. 105-117. DOI:Pages:
105-117Efanov D. V.
To quote:
Efanov D. V.
Linux security modules as general method for implementing security policies // Information Security Problems. Computer Systems. 2007. № 2. Pp. 118-122. DOI:Pages:
118-122