Funding Data Link References Status API Help
Page 2 of 74 results
Sort by: relevance publication year

Application of the Theory of Opportunities in the Modeling of Information Systems

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 2 to 5

Authors: Evgeniy Sherbakov, Federal State Military Educational Institution of Higher Professional Education «Military Aerospace Defense Academy named after Marshal of the Soviet Union G.K. Zhukov» of the Russian Federation Department of Defense, Pavel Korchagin, Mozhaisky Military Space Academy

Functional Model for Communication Network with Unknown Assurance Level and Evaluation of Its Capabilities of Rendering VPN Service of the Set Quality

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 6 to 15

Authors: Vasiliy Anisimov, Federal State Public Educational Institution of Higher Professional Education Military Telecommunication Academy named after the Soviet Union Marshal Budienny S. M., Alexey Begaev, Yurii Starodubtsev, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Peter the Great St.Petersburg Polytechnic University

CVE-2015-7547 Exploit Parsing

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 22 to 30

Authors: Alexey Kasikin, Bauman Moscow State Technical University

Application of the Community Allocation Algorithm in the Information Confrontation in the Social Networks

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 37 to 44

Authors: Vladislav Chesnokov, Bauman Moscow State Technical University

Up-to-date Requirements for Scientific Articles

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 63 to 66

Authors: Grigory Makarenko, FBU SCLI

Methods of Designing Cryptographic Hash-Functions Based on Iteration of the Uniform Cellular Automat

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 45 to 50

Authors: Petr Klyucharev, Bauman Moscow State Technical University

Book Review: Seven Information Security Technologies

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 67 to 72

Authors: Sergey Petrenko, Autonomous nonprofit organization of higher education Innopolis University

Journal Issue published 2017 in Voprosy kiberbezopasnosti issue 1(19)

Iterative Method for Clone Code Detection Based on Computing the Edit Distance

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 16 to 21

Authors: Dmitrii Kononov, FGUP «18 CNII» MO RF

Study into the Structure of the Scientific Coathorship Graph Using Social Network Analysis

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 31 to 36

Authors: Mikhail Basarab, Bauman Moscow State Technical University, Elena Glinskaya, Igor Ivanov, Aleksandr Kolesnikov, Kuzovlev Vyacheslav, Bauman Moscow State Technical University, Bauman Moscow State Technical University, Bauman Moscow State Technical University, Bauman Moscow State Technical University