Funding Data Link References Status API Help
Page 2 of 114 results
Sort by: relevance publication year

Big Data Technologies for Security Event Correlation Based on Event Type Accounting

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 2 to 16

Authors: Igor Kotenko, Institute for Informatics and Automation of the Russian Academy of Sciences, Andrey Fedorchenko, Igor Saenko, Alexey Kushnerevich, Institute for Informatics and Automation of the Russian Academy of Sciences, Institute for Informatics and Automation of the Russian Academy of Sciences, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics

Assessment of Entropy of Information Security Systems

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 30 to 41

Authors: Ilya Livshitz, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Andrew Neklydov , Gazinformservice Ltd

Evaluation of the Survivability of Integrated Information-Telecommunication Networks

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 72 to 82

Authors: Boris Iskolnyy, Krasnodar higher military school named after General of the army S.M. Shtemenko, Roman Maximov, Sergey Sharifullin, Krasnodar higher military school named after General of the army S.M. Shtemenko, Krasnodar higher military school named after General of the army S.M. Shtemenko

Password Authentication and Continuous Authentication by Keystroke Dynamics Using Mathematical Statistics

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 91 to 99

Authors: Dmitry Krutohvostov, Novosibirsk State Technical University, Vladimir Khitsenko, Novosibirsk State Technical University

Analisys of Ways to Secure Group Control for Autonomus Mobile Robots

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 42 to 49

Authors: Alexander Basan, Southern Federal University, Elena Basan, Oleg Makarevich, Southern Federal University, Southern Federal University

The Concept of External Iterationdesign Appearance a Proactive Systems Information Security

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 50 to 63

Authors: Igor Gorbachev, Federal State Establishment «Mozhaisky Military Aerospace Academy»

The model of formation the requirements for information security to the developed automated systems in the protected execution

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 83 to 90

Authors: Sergey Bibashov, Academy n.a. Peter the Great

The Confidential Data Divided Transmission Scheme Based on Differential Calculus of Polynomials in Several Variables Over Prime Galois Fields

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 64 to 71

Authors: Vladimir Deundyak, FGNU SRI «Specvuzavtomatika», Nadia Mogilevskaya, Don State Technical Universyty

About Information Security of Email Services

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 5(13) on pages 55 to 59

Authors: Georii Markov, Bauman Moscow State Technical University, Vladislav Sharunov, University of Greenwich

Journal Issue published 2013 in Voprosy kiberbezopasnosti issue 2

The Experiment on the Use of Neural Network Technology for Test Open Software

Journal Article published 2013 in Voprosy kiberbezopasnosti issue 2 on pages 47 to 52

Authors: Georgiy Markov, Bauman Moscow State Technical University

Annals of cyberwar and the greatest in the history of the redistribution of wealth

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 1(14) on pages 68 to 74

Authors: Alexey Markov, Bauman Moscow State Technical University

Journal Issue published 2017 in Voprosy kiberbezopasnosti issue 1(19)

Application of the Theory of Opportunities in the Modeling of Information Systems

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 2 to 5

Authors: Evgeniy Sherbakov, Federal State Military Educational Institution of Higher Professional Education «Military Aerospace Defense Academy named after Marshal of the Soviet Union G.K. Zhukov» of the Russian Federation Department of Defense, Pavel Korchagin, Mozhaisky Military Space Academy

Iterative Method for Clone Code Detection Based on Computing the Edit Distance

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 16 to 21

Authors: Dmitrii Kononov, FGUP «18 CNII» MO RF

CVE-2015-7547 Exploit Parsing

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 22 to 30

Authors: Alexey Kasikin, Bauman Moscow State Technical University

Application of the Community Allocation Algorithm in the Information Confrontation in the Social Networks

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 37 to 44

Authors: Vladislav Chesnokov, Bauman Moscow State Technical University

Study into the Structure of the Scientific Coathorship Graph Using Social Network Analysis

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 31 to 36

Authors: Mikhail Basarab, Bauman Moscow State Technical University, Elena Glinskaya, Igor Ivanov, Aleksandr Kolesnikov, Kuzovlev Vyacheslav, Bauman Moscow State Technical University, Bauman Moscow State Technical University, Bauman Moscow State Technical University, Bauman Moscow State Technical University

Methods of Designing Cryptographic Hash-Functions Based on Iteration of the Uniform Cellular Automat

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 45 to 50

Authors: Petr Klyucharev, Bauman Moscow State Technical University

Recognition of a Discrete Signal in the Additive Noise for Two Data Transmission Channels

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 57 to 62

Authors: Igor Troitskii, Bauman Moscow State Technical University, Rustam Yakubov, Bauman Moscow State Technical University