Funding Data Link References Status API Help
Page 3 of 114 results
Sort by: relevance publication year

Big Data Technologies for Security Event Correlation Based on Event Type Accounting

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 2 to 16

Authors: Igor Kotenko, Institute for Informatics and Automation of the Russian Academy of Sciences, Andrey Fedorchenko, Igor Saenko, Alexey Kushnerevich, Institute for Informatics and Automation of the Russian Academy of Sciences, Institute for Informatics and Automation of the Russian Academy of Sciences, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics

Assessment of Entropy of Information Security Systems

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 30 to 41

Authors: Ilya Livshitz, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Andrew Neklydov , Gazinformservice Ltd

Evaluation of the Survivability of Integrated Information-Telecommunication Networks

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 72 to 82

Authors: Boris Iskolnyy, Krasnodar higher military school named after General of the army S.M. Shtemenko, Roman Maximov, Sergey Sharifullin, Krasnodar higher military school named after General of the army S.M. Shtemenko, Krasnodar higher military school named after General of the army S.M. Shtemenko

Password Authentication and Continuous Authentication by Keystroke Dynamics Using Mathematical Statistics

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 91 to 99

Authors: Dmitry Krutohvostov, Novosibirsk State Technical University, Vladimir Khitsenko, Novosibirsk State Technical University

Analisys of Ways to Secure Group Control for Autonomus Mobile Robots

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 42 to 49

Authors: Alexander Basan, Southern Federal University, Elena Basan, Oleg Makarevich, Southern Federal University, Southern Federal University

The Concept of External Iterationdesign Appearance a Proactive Systems Information Security

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 50 to 63

Authors: Igor Gorbachev, Federal State Establishment «Mozhaisky Military Aerospace Academy»

The model of formation the requirements for information security to the developed automated systems in the protected execution

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 83 to 90

Authors: Sergey Bibashov, Academy n.a. Peter the Great

The Confidential Data Divided Transmission Scheme Based on Differential Calculus of Polynomials in Several Variables Over Prime Galois Fields

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 64 to 71

Authors: Vladimir Deundyak, FGNU SRI «Specvuzavtomatika», Nadia Mogilevskaya, Don State Technical Universyty

About Information Security of Email Services

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 5(13) on pages 55 to 59

Authors: Georii Markov, Bauman Moscow State Technical University, Vladislav Sharunov, University of Greenwich

Journal Issue published 2013 in Voprosy kiberbezopasnosti issue 2