Dudorov E. N.
To quote:
Dudorov E. N.
Applicability research of the neural-net analysis of system calls sequence in an expert system of programme operating modes recognition // Information Security Problems. Computer Systems. 2006. № 1. Pp. 5-9. DOI:Pages:
5-9Lysenko A. G.
To quote:
Lysenko A. G.
Malicious software for the mobile devices // Information Security Problems. Computer Systems. 2006. № 1. Pp. 10-14. DOI:Pages:
10-14Zegzhda D. P.
To quote:
Zegzhda D. P.
Secure hybrid operating system «Linux over Fenix» // Information Security Problems. Computer Systems. 2006. № 1. Pp. 15-25. DOI:Pages:
15-25Zegzhda D. P., Kalinin M. O., Lysenko A. G., Moskvin D. A.
To quote:
Zegzhda D. P., Kalinin M. O., Lysenko A. G., Moskvin D. A.
The algorithmic model of access control in the Windows operating systems // Information Security Problems. Computer Systems. 2006. № 1. Pp. 26-29. DOI:Pages:
26-29Denisenko M. P.
To quote:
Denisenko M. P.
In this article we consider the problem of proof the correctness of the cryptographic protocol of open key distribution. the approach to the soluion of his problem is based on technique «Strand spaces» // Information Security Problems. Computer Systems. 2006. № 1. Pp. 30-39. DOI:Pages:
30-39Kabanov Artem S.
To quote:
Kabanov Artem S.
The theory of operation of final game models for an estimation of efficiency of protective systems on electronic keys // Information Security Problems. Computer Systems. 2006. № 1. Pp. 40-43. DOI:Pages:
40-43Kabanov Artem S.
To quote:
Kabanov Artem S.
Technique of construction of models of protective systems on electronic keys with full overlap and estimation of their efficiency under the given models // Information Security Problems. Computer Systems. 2006. № 1. Pp. 44-50. DOI:Pages:
44-50Yakovlev V. A., Korzhik V. I., Bakaev M. V.
To quote:
Yakovlev V. A., Korzhik V. I., Bakaev M. V.
Key agreement protocols based on extractors under the conditions of noisy channel and active adversaries // Information Security Problems. Computer Systems. 2006. № 1. Pp. 51-67. DOI:Pages:
51-67Kotenko I. V., Stepashkin M. V., Bogdanov V. S.
To quote:
Kotenko I. V., Stepashkin M. V., Bogdanov V. S.
Architectures and models of active vulnerabilities analysis based on simulation of malefactors’ actions // Information Security Problems. Computer Systems. 2006. № 2. Pp. 7-24. DOI:Pages:
7-24Kriachko A. F., Nazarov A. V., Pantenkov A. P., Shinkevich A. S.
To quote:
Kriachko A. F., Nazarov A. V., Pantenkov A. P., Shinkevich A. S.
The synthesis of intelligence systems-telemetering protection gears optimum composition on the basis of neural problem solving of combinatorial optimization // Information Security Problems. Computer Systems. 2006. № 2. Pp. 25-30. DOI:Pages:
25-30Gryzunov V. V.
To quote:
Gryzunov V. V.
Structure-functional synthesis of the model of intrusion prevention system // Information Security Problems. Computer Systems. 2006. № 2. Pp. 31-38. DOI:Pages:
31-38Svirin I. S.
To quote:
Svirin I. S.
The analytical method of the information representation quality assessment for the typical system behavior // Information Security Problems. Computer Systems. 2006. № 2. Pp. 39-44. DOI:Pages:
39-44Zegzhda D. P., Kovalenko S. L.
To quote:
Zegzhda D. P., Kovalenko S. L.
Security issues of wireless networks IEEE 802.11a/b/g // Information Security Problems. Computer Systems. 2006. № 2. Pp. 45-49. DOI:Pages:
45-49Britov A. G., Mironchikov E. T.
To quote:
Britov A. G., Mironchikov E. T.
Redundancy in the information processes of data processing and security systems // Information Security Problems. Computer Systems. 2006. № 2. Pp. 50-54. DOI:Pages:
50-54Denisenko M. P.
To quote:
Denisenko M. P.
Technique «Strand spaces». Analysis of cryptographic protocols using authentication tests // Information Security Problems. Computer Systems. 2006. № 2. Pp. 55-66. DOI:Pages:
55-66Kabanov A. S.
To quote:
Kabanov A. S.
Estimation of hardening of protective systems on electronic keys operating partial encoding of the defended appendix // Information Security Problems. Computer Systems. 2006. № 2. Pp. 67-73. DOI:Pages:
67-73Kryachko A. F., Silakov D. M.
To quote:
Kryachko A. F., Silakov D. M.
The video sequences data hiding // Information Security Problems. Computer Systems. 2006. № 2. Pp. 74-78. DOI:Pages:
74-78Kuritsyn K. A.
To quote:
Kuritsyn K. A.
Modern quantum key distribution systems // Information Security Problems. Computer Systems. 2006. № 2. Pp. 79-82. DOI:Pages:
79-82Makarov S. B., Xue Wei
To quote:
Makarov S. B., Xue Wei
Synthesis of band width efficient signals for the protected wireless telecommunication systems with the limited power resource // Information Security Problems. Computer Systems. 2006. № 2. Pp. 83-94. DOI:Pages:
83-94Matveev А. V., Matveev V. V., Magulyan G. G.
To quote:
Matveev А. V., Matveev V. V., Magulyan G. G.
Safety of the automated control systems of objects of electric power industry from electromagnetic terrorism // Information Security Problems. Computer Systems. 2006. № 2. Pp. 95-98. DOI:Pages:
95-98Zegzhda P. D., Kort S. S.
To quote:
Zegzhda P. D., Kort S. S.
Main modules of the host intrusion detection system // Information Security Problems. Computer Systems. 2006. № 3. Pp. 7-16. DOI:Pages:
7-16Sineshuk U. I., Markov O. N., Bondarenko I. V.
To quote:
Sineshuk U. I., Markov O. N., Bondarenko I. V.
Efficiency neural of optimization at forecasting the condition of information security of the automated system // Information Security Problems. Computer Systems. 2006. № 3. Pp. 17-20. DOI:Pages:
17-20Baranov P. А.
To quote:
Baranov P. А.
Anomaly detection based on the power of scattering characteristic analysis in a goodness-of-fit test // Information Security Problems. Computer Systems. 2006. № 3. Pp. 21-29. DOI:Pages:
21-29Julkov E. V., Platonov V. V.
To quote:
Julkov E. V., Platonov V. V.
Modular approach to build neural networks for anomaly detection // Information Security Problems. Computer Systems. 2006. № 3. Pp. 30-34. DOI:Pages:
30-34Zegzhda D. P., Kovalenko S. L.
To quote:
Zegzhda D. P., Kovalenko S. L.
Security issues of storing passwords of wireless networks IEEE 802.11a/b/g in OS Windows XP // Information Security Problems. Computer Systems. 2006. № 3. Pp. 35-37. DOI:Pages:
35-37Lysenko A. G., Shevelkin A. U.
To quote:
Lysenko A. G., Shevelkin A. U.
Anomaly detection in hybrid networks // Information Security Problems. Computer Systems. 2006. № 3. Pp. 38-42. DOI:Pages:
38-42Ovchinnirjva E. V.
To quote:
Ovchinnirjva E. V.
Detection of anomalies on the base of dispersion distance computation // Information Security Problems. Computer Systems. 2006. № 3. Pp. 43-47. DOI:Pages:
43-47Ovchinnirjva E. V.
To quote:
Ovchinnirjva E. V.
Transformations of probabilistic suffix trees // Information Security Problems. Computer Systems. 2006. № 3. Pp. 48-54. DOI:Pages:
48-54Zegzhda D. P., Korotich A. V.
To quote:
Zegzhda D. P., Korotich A. V.
Control of access to information resources of multi-ties information systems // Information Security Problems. Computer Systems. 2006. № 3. Pp. 55-61. DOI:Pages:
55-61Markov O. N., Kusov E. V., Gvozdik J. M.
To quote:
Markov O. N., Kusov E. V., Gvozdik J. M.
Conformance evaluation of information security of audit objects to requirements of management directives // Information Security Problems. Computer Systems. 2006. № 3. Pp. 62-71. DOI:Pages:
62-71Rudina E. A.
To quote:
Rudina E. A.
Role-based access control implementation for Windows 2000/XP // Information Security Problems. Computer Systems. 2006. № 3. Pp. 72-77. DOI:Pages:
72-77Dmitriev I. L.
To quote:
Dmitriev I. L.
Authentication codes from perfect nonlinear function // Information Security Problems. Computer Systems. 2006. № 3. Pp. 78-83. DOI:Pages:
78-83Dmitriev I. L.
To quote:
Dmitriev I. L.
Computation of a message authentication code // Information Security Problems. Computer Systems. 2006. № 3. Pp. 84-88. DOI:Pages:
84-88Kusov Е.
To quote:
Kusov Е.
Inspection ratio optimization // Information Security Problems. Computer Systems. 2006. № 3. Pp. 89-94. DOI:Pages:
89-94Matveev A. V., Bespalov D. S., Kopacheva M. V., Sinkovskja E. V.
To quote:
Matveev A. V., Bespalov D. S., Kopacheva M. V., Sinkovskja E. V.
Consideration of psychological aspect in the model of threat to informational safety in management structure // Information Security Problems. Computer Systems. 2006. № 3. Pp. 95-98. DOI:Pages:
95-98Gubin V., Kusov Е., Berezin A.
To quote:
Gubin V., Kusov Е., Berezin A.
Psychological conditions of professional characteristics forming in information security education // Information Security Problems. Computer Systems. 2006. № 3. Pp. 99-106. DOI:Pages:
99-106Suprun A. F., Ermilov V. V., Matveev V. V.
To quote:
Suprun A. F., Ermilov V. V., Matveev V. V.
Organisational and technical measures to protect special subjects studying process at the departments of military education // Information Security Problems. Computer Systems. 2006. № 3. Pp. 107-111. DOI:Pages:
107-111