Quarterly journal published in SPbPU
and edited by prof. Dmitry Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2025 year
  • 2024 year
  • 2023 year
  • 2022 year
  • 2021 year
  • 2020 year
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
    • № 1 2007
      • INFORMATION SECURITY ASPECTS

        Tregubov A. G.

        AI in systems of defence

        To quote:

        Tregubov A. G.

        AI in systems of defence // Information Security Problems. Computer Systems. 2007. № 1. Pp. 7-10. DOI:

        Pages:

        7-10
      • INFORMATION SECURITY APPLICATION

        Baranov A. P.

        Practical experience of foreign products’ application in secure information systems

        To quote:

        Baranov A. P.

        Practical experience of foreign products’ application in secure information systems // Information Security Problems. Computer Systems. 2007. № 1. Pp. 11-14. DOI:

        Pages:

        11-14

        Kriachko A. F., Nazarov A. V., Pantenkov A. P. Shinkevich A. S.

        Synthesis algorithm of the intelligence systems-telemetering protection means based on the navigation of the most probable itinerary of implementation vulnerability

        To quote:

        Kriachko A. F., Nazarov A. V., Pantenkov A. P. Shinkevich A. S.

        Synthesis algorithm of the intelligence systems-telemetering protection means based on the navigation of the most probable itinerary of implementation vulnerability // Information Security Problems. Computer Systems. 2007. № 1. Pp. 15-20. DOI:

        Pages:

        15-20
      • APPLIED CRYPTOGRAPHY

        Kabanov A. S.

        Estimation of hardening of protective systems on electronic keys operating the gear the inquiry – answer, without encoding the defended appendix

        To quote:

        Kabanov A. S.

        Estimation of hardening of protective systems on electronic keys operating the gear the inquiry – answer, without encoding the defended appendix // Information Security Problems. Computer Systems. 2007. № 1. Pp. 21-26. DOI:

        Pages:

        21-26

        Kabanov A. S.

        Usage of the zero knowledge protocols for protective systems on electronic keys

        To quote:

        Kabanov A. S.

        Usage of the zero knowledge protocols for protective systems on electronic keys // Information Security Problems. Computer Systems. 2007. № 1. Pp. 27-33. DOI:

        Pages:

        27-33

        Rostovtsev A. G.

        Generation of imaginary quadratic orders with given class subgroup

        To quote:

        Rostovtsev A. G.

        Generation of imaginary quadratic orders with given class subgroup // Information Security Problems. Computer Systems. 2007. № 1. Pp. 34-40. DOI:

        Pages:

        34-40

        Rostovtsev A. G.

        On 2-adic method of hash-function inverting

        To quote:

        Rostovtsev A. G.

        On 2-adic method of hash-function inverting // Information Security Problems. Computer Systems. 2007. № 1. Pp. 41-47. DOI:

        Pages:

        41-47
      • NETWORK AND TELECOMMUNICATION SECURITY

        Baranov P. A.

        Classification of software characteristics used for anomaly detection

        To quote:

        Baranov P. A.

        Classification of software characteristics used for anomaly detection // Information Security Problems. Computer Systems. 2007. № 1. Pp. 48-54. DOI:

        Pages:

        48-54

        Kort S. S., Nemchaninov A. A.

        Intrusion detection system with context consideration

        To quote:

        Kort S. S., Nemchaninov A. A.

        Intrusion detection system with context consideration // Information Security Problems. Computer Systems. 2007. № 1. Pp. 55-59. DOI:

        Pages:

        55-59
      • FUNDAMENTAL THEORY OF INFORMATION CONFRONTATION

        Zegzhda P. D.

        General trends of information security technologies evolution in the epoch of information warfare

        To quote:

        Zegzhda P. D.

        General trends of information security technologies evolution in the epoch of information warfare // Information Security Problems. Computer Systems. 2007. № 1. Pp. 60-72. DOI:

        Pages:

        60-72
      • TECHNICAL SOLUTION

        Volvenko S. V., Makarov S. B.

        Simulation model of meteor burst communications system

        To quote:

        Volvenko S. V., Makarov S. B.

        Simulation model of meteor burst communications system // Information Security Problems. Computer Systems. 2007. № 1. Pp. 73-85. DOI:

        Pages:

        73-85
    • № 2 2007
      • INFORMATION SECURITY ASPECTS

        Dudorov E. N., Pravikov D. I.

        Determinacy analysis a method of discernment of offences in the computer information ORB

        To quote:

        Dudorov E. N., Pravikov D. I.

        Determinacy analysis a method of discernment of offences in the computer information ORB // Information Security Problems. Computer Systems. 2007. № 2. Pp. 7-10. DOI:

        Pages:

        7-10

        Kopanitsa George, Mescheriakov Roman

        Application of decidable modal formalism for the estimation of information security

        To quote:

        Kopanitsa George, Mescheriakov Roman

        Application of decidable modal formalism for the estimation of information security // Information Security Problems. Computer Systems. 2007. № 2. Pp. 11-15. DOI:

        Pages:

        11-15

        Tenetko M. I., Peskova O. Y.

        Representation of informational risks in the form of fuzzy semantic network

        To quote:

        Tenetko M. I., Peskova O. Y.

        Representation of informational risks in the form of fuzzy semantic network // Information Security Problems. Computer Systems. 2007. № 2. Pp. 16-19. DOI:

        Pages:

        16-19
      • INFORMATION SECURITY APPLICATION

        Abdulmanov R. A., Zegzhda P. D., Kalinin M. O.

        Security settings influence on the risk analysis in secure information systems

        To quote:

        Abdulmanov R. A., Zegzhda P. D., Kalinin M. O.

        Security settings influence on the risk analysis in secure information systems // Information Security Problems. Computer Systems. 2007. № 2. Pp. 20-26. DOI:

        Pages:

        20-26

        Avramenko V. S.

        Estimation methods of the information security from not authorized access in conditions of the fuzzy data

        To quote:

        Avramenko V. S.

        Estimation methods of the information security from not authorized access in conditions of the fuzzy data // Information Security Problems. Computer Systems. 2007. № 2. Pp. 27-31. DOI:

        Pages:

        27-31

        Moskvin D. A., Kalinin M. O.

        A calculation of the optimum security configuration in Windows

        To quote:

        Moskvin D. A., Kalinin M. O.

        A calculation of the optimum security configuration in Windows // Information Security Problems. Computer Systems. 2007. № 2. Pp. 32-38. DOI:

        Pages:

        32-38

        Platonov V. V., Teimurov V. A.

        Bytecode instrumentation

        To quote:

        Platonov V. V., Teimurov V. A.

        Bytecode instrumentation // Information Security Problems. Computer Systems. 2007. № 2. Pp. 39-43. DOI:

        Pages:

        39-43

        Savelyeva O. V., Platonov V. V.

        Methods of niching in intrusion detection systems

        To quote:

        Savelyeva O. V., Platonov V. V.

        Methods of niching in intrusion detection systems // Information Security Problems. Computer Systems. 2007. № 2. Pp. 44-49. DOI:

        Pages:

        44-49

        Fedoseyev V.

        Paradigm change in access control

        To quote:

        Fedoseyev V.

        Paradigm change in access control // Information Security Problems. Computer Systems. 2007. № 2. Pp. 50-57. DOI:

        Pages:

        50-57
      • APPLIED CRYPTOGRAPHY

        Grusho A. A., Grusho N. A., Timonina E. E.

        Some applications of data hiding and secure data hiding methods

        To quote:

        Grusho A. A., Grusho N. A., Timonina E. E.

        Some applications of data hiding and secure data hiding methods // Information Security Problems. Computer Systems. 2007. № 2. Pp. 58-63. DOI:

        Pages:

        58-63

        Ivashko A. M.

        A model of computer for security requirements impementation analysis

        To quote:

        Ivashko A. M.

        A model of computer for security requirements impementation analysis // Information Security Problems. Computer Systems. 2007. № 2. Pp. 64-71. DOI:

        Pages:

        64-71

        Sinjuk A. D.

        Potential conditions estimation of key sharing based on noiseless public channels

        To quote:

        Sinjuk A. D.

        Potential conditions estimation of key sharing based on noiseless public channels // Information Security Problems. Computer Systems. 2007. № 2. Pp. 72-82. DOI:

        Pages:

        72-82

        Shadrin O. S.

        Using cyclotomic fields in number field sieve for discrete logarithms

        To quote:

        Shadrin O. S.

        Using cyclotomic fields in number field sieve for discrete logarithms // Information Security Problems. Computer Systems. 2007. № 2. Pp. 83-87. DOI:

        Pages:

        83-87

        Shtanko S. V.

        Combined information security algorithm based on elliptic curves mathematical tool

        To quote:

        Shtanko S. V.

        Combined information security algorithm based on elliptic curves mathematical tool // Information Security Problems. Computer Systems. 2007. № 2. Pp. 88-94. DOI:

        Pages:

        88-94
      • FUNDAMENTAL THEORY OF INFORMATION CONFRONTATION

        Shlyakhin V. M., Shlyakhin A. V.

        Peculiarities of conflict modeling under conditions of unauthorized access

        To quote:

        Shlyakhin V. M., Shlyakhin A. V.

        Peculiarities of conflict modeling under conditions of unauthorized access // Information Security Problems. Computer Systems. 2007. № 2. Pp. 95-99. DOI:

        Pages:

        95-99
      • NETWORK AND TELECOMMUNICATION SECURITY

        Lysenko A. G.

        Risks analysis of the information security violation in networks with mobile segments

        To quote:

        Lysenko A. G.

        Risks analysis of the information security violation in networks with mobile segments // Information Security Problems. Computer Systems. 2007. № 2. Pp. 100-104. DOI:

        Pages:

        100-104

        Nazarov I. O.

        The web-systems safety analysis in cross-site scripting class vulnerability realization conditions

        To quote:

        Nazarov I. O.

        The web-systems safety analysis in cross-site scripting class vulnerability realization conditions // Information Security Problems. Computer Systems. 2007. № 2. Pp. 105-117. DOI:

        Pages:

        105-117
      • ЗАЩИЩЕННЫЕ ОПЕРАЦИОННЫЕ СИСТЕМЫ

        Efanov D. V.

        Linux security modules as general method for implementing security policies

        To quote:

        Efanov D. V.

        Linux security modules as general method for implementing security policies // Information Security Problems. Computer Systems. 2007. № 2. Pp. 118-122. DOI:

        Pages:

        118-122
  • 2006 year
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year