Funding Data Link References Status API Help
Page 2 of 100 results
Sort by: relevance publication year

Efficiency of Steganalysis Based on Machine-Learning Methods

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 2(20) on pages 53 to 60

Authors: Aleksei Sivachev, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Nikolai Prokhozhev, Olga Mikhailichenko, Daniil Bashmakov, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics

Recognition of a Discrete Signal in the Additive Noise for Two Data Transmission Channels

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 57 to 62

Authors: Igor Troitskii, Bauman Moscow State Technical University, Rustam Yakubov, Bauman Moscow State Technical University

Application of the Theory of Opportunities in the Modeling of Information Systems

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 2 to 5

Authors: Evgeniy Sherbakov, Federal State Military Educational Institution of Higher Professional Education «Military Aerospace Defense Academy named after Marshal of the Soviet Union G.K. Zhukov» of the Russian Federation Department of Defense, Pavel Korchagin, Mozhaisky Military Space Academy

Functional Model for Communication Network with Unknown Assurance Level and Evaluation of Its Capabilities of Rendering VPN Service of the Set Quality

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 6 to 15

Authors: Vasiliy Anisimov, Federal State Public Educational Institution of Higher Professional Education Military Telecommunication Academy named after the Soviet Union Marshal Budienny S. M., Alexey Begaev, Yurii Starodubtsev, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Peter the Great St.Petersburg Polytechnic University

CVE-2015-7547 Exploit Parsing

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 22 to 30

Authors: Alexey Kasikin, Bauman Moscow State Technical University

Application of the Community Allocation Algorithm in the Information Confrontation in the Social Networks

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 37 to 44

Authors: Vladislav Chesnokov, Bauman Moscow State Technical University

Up-to-date Requirements for Scientific Articles

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 63 to 66

Authors: Grigory Makarenko, FBU SCLI

Methods of Designing Cryptographic Hash-Functions Based on Iteration of the Uniform Cellular Automat

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 45 to 50

Authors: Petr Klyucharev, Bauman Moscow State Technical University

Book Review: Seven Information Security Technologies

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 67 to 72

Authors: Sergey Petrenko, Autonomous nonprofit organization of higher education Innopolis University

Journal Issue published 2017 in Voprosy kiberbezopasnosti issue 1(19)

Iterative Method for Clone Code Detection Based on Computing the Edit Distance

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 16 to 21

Authors: Dmitrii Kononov, FGUP «18 CNII» MO RF

Study into the Structure of the Scientific Coathorship Graph Using Social Network Analysis

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 31 to 36

Authors: Mikhail Basarab, Bauman Moscow State Technical University, Elena Glinskaya, Igor Ivanov, Aleksandr Kolesnikov, Kuzovlev Vyacheslav, Bauman Moscow State Technical University, Bauman Moscow State Technical University, Bauman Moscow State Technical University, Bauman Moscow State Technical University

Analysis and Comparison of Electronic Digital Signature Algorithms GOST R 34.10-1994, GOST R 34.10-2001 and GOST R 34.10-2012

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 51 to 56

Authors: Antonina Komarova, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Aleksandr Menshchikov, Anatoly Korobeynikov, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics

The 28 Magic Practices for Secure Software Development

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 5(13) on pages 2 to 10

Authors: Aleksandr Barabanov, NPO Echelon, Alexey Markov, Valentin Tsirlov, Bauman Moscow State Technical University, Bauman Moscow State Technical University

Annals of cyberwar and the greatest in the history of the redistribution of wealth

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 1(14) on pages 68 to 74

Authors: Alexey Markov, Bauman Moscow State Technical University

Journal Issue published 2016 in Voprosy kiberbezopasnosti issue 4(17)

Cyber Danger as One of the Strategic Threats to Russia's Energy Security

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 2 to 10

Authors: Liudmila Massel, Melentiev Energy Systems Institute of Siberian Branch of the Russian Academy of Sciences, Nikolay Voropay, Sergey Senderov, Aleksei Massel, Melentiev Energy Systems Institute of Siberian Branch of the Russian Academy of Sciences, Melentiev Energy Systems Institute of Siberian Branch of the Russian Academy of Sciences, Melentiev Energy Systems Institute of Siberian Branch of the Russian Academy of Sciences

Detection of Illegal Activities in Cyberspace on the Basis of the Social Networks Analysis: Algorithms, Methods, and Tools (A Survey)

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 11 to 19

Authors: Mikhail Basarab, Bauman Moscow State Technical University, Igor Ivanov, Aleksandr Kolesnikov, Valeriy Matveev, Bauman Moscow State Technical University, Bauman Moscow State Technical University, Bauman Moscow State Technical University

Issues of Protecting Business Information Systems from Botnets Attacks

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 20 to 28

Authors: Maxim Kosenko, Chelyabinsk State University, Andrey Melnikov, Chelyabinsk State University

Counteraction to Computer Attacks in Railway Transport

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 29 to 35

Authors: Roman Bakurkin, OAO «NIIAS», Boris Bezrodnyi, Alexander Korotin, OAO «NIIAS», OAO «NIIAS»