Funding Data Link References Status API Help
Page 3 of 68 results
Sort by: relevance publication year

First Order Logic for Program Code Functional Requirements Description

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 3(21) on pages 2 to 7

Authors: Aleksandr Kozachok, The Academy of the Federal Guard Service of the Russian Federation, Maxim Bochkov, Tuan Lai Minh, Evgeniy Kochetkov, Business Risk Educational Center, The Academy of Cryptographic Techniques, The Academy of the Federal Guard Service of the Russian Federation

Authentication of Computer Users in Real-Time by Generating Bit Sequences Based on Keyboard Handwriting and Face Features

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 3(21) on pages 24 to 34

Authors: Pavel Lozhnikov, Omsk State Technical University, Alexey Sulavko, Ekaterina Buraya, Viktor Pisarenko, Omsk State Technical University, Federal State Budgetary Educational Institution of Higher Education "Ufa State Aviation Technical University", Omsk State Technical University

Increasing Process of Evaluation Security of Allocated Room from Technical Channels of Leakage Information

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 3(21) on pages 35 to 42

Authors: Ivan Savelyev, Finance University under the Government of the Russian Federation, Anton Antipenko, JSC «Gazprom elektrogaz»

Expansion of the Operational Risk Profile in Banks Under Increase of DDoS-threats

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 3(21) on pages 16 to 23

Authors: Pavel Revenkov, Finance University under the Government of the Russian Federation, Alexandr Berdyugin, Finance University under the Government of the Russian Federation

The Technology of Hiding the Destination Address Domain Fronting

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 3(21) on pages 43 to 48

Authors: Kay Tyurin, Federal State Autonomous Scientific Establishment «Scientific Research Institute «Specialized Security Computing Devices and Automation» (FSASE «Spetsvuzavtomatika»), Larissa Cherckesova, Olga Safaryan, Don State Technical Universyty, Don State Technical Universyty

A Study of Web-Crawlers Behaviour

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 3(21) on pages 49 to 54

Authors: Aleksandr Menshchikov, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Antonina Komarova, Yurij Gatchin, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics

Cellular Automata in Cryptography. Part 1

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 3(21) on pages 70 to 76

Authors: Aleksei Zhukov, Association RusCrypto

Representing Programs with Similarity Invariants for Monitoring Tampering with Calculations

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 2(20) on pages 9 to 20

Authors: Alexsandra Kharzhevskaya, Mozhaisky Military Space Academy, Aleksandr Lomako, Sergey Petrenko, Mozhaisky Military Space Academy, Autonomous nonprofit organization of higher education Innopolis University

Statistics of Software Vulnerabilities Detection During Certified Testing

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 2(20) on pages 2 to 8

Authors: Aleksandr Barabanov, NPO Echelon, JSC, Aleksey Markov, Andrey Fadin, Valentin Tsirlov, Bauman Moscow State Technical University, NPO Echelon, JSC, Bauman Moscow State Technical University

Arrangement of One-Way Data Transmission Networks in the Secure Environment Conditions

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 2(20) on pages 21 to 29

Authors: Alexander Vorontsov, N.L. Dukhov All-Russia Research Institute of Automatics, Sergey Petunin, N.L. Dukhov All-Russia Research Institute of Automatics