Funding Data Link References Status API Help
Page 3 of 114 results
Sort by: relevance publication year

Recognition of a Discrete Signal in the Additive Noise for Two Data Transmission Channels

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 57 to 62

Authors: Igor Troitskii, Bauman Moscow State Technical University, Rustam Yakubov, Bauman Moscow State Technical University

Book Review: Seven Information Security Technologies

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 67 to 72

Authors: Sergey Petrenko, Autonomous nonprofit organization of higher education Innopolis University

Functional Model for Communication Network with Unknown Assurance Level and Evaluation of Its Capabilities of Rendering VPN Service of the Set Quality

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 6 to 15

Authors: Vasiliy Anisimov, Federal State Public Educational Institution of Higher Professional Education Military Telecommunication Academy named after the Soviet Union Marshal Budienny S. M., Alexey Begaev, Yurii Starodubtsev, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Peter the Great St.Petersburg Polytechnic University

Up-to-date Requirements for Scientific Articles

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 63 to 66

Authors: Grigory Makarenko, FBU SCLI

Analysis and Comparison of Electronic Digital Signature Algorithms GOST R 34.10-1994, GOST R 34.10-2001 and GOST R 34.10-2012

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 51 to 56

Authors: Antonina Komarova, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Aleksandr Menshchikov, Anatoly Korobeynikov, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics

Journal Issue published 2014 in Voprosy kiberbezopasnosti issue 2(3)

Journal Issue published 2016 in Voprosy kiberbezopasnosti issue 4(17)

Detection of Illegal Activities in Cyberspace on the Basis of the Social Networks Analysis: Algorithms, Methods, and Tools (A Survey)

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 11 to 19

Authors: Mikhail Basarab, Bauman Moscow State Technical University, Igor Ivanov, Aleksandr Kolesnikov, Valeriy Matveev, Bauman Moscow State Technical University, Bauman Moscow State Technical University, Bauman Moscow State Technical University

Counteraction to Computer Attacks in Railway Transport

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 29 to 35

Authors: Roman Bakurkin, OAO «NIIAS», Boris Bezrodnyi, Alexander Korotin, OAO «NIIAS», OAO «NIIAS»

Application of Operating Systems with Open Source Code in of Communication Equipment for Networks with Commutation of Packages

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 36 to 44

Authors: Dmitry Vasinev, The Academy of Federal Security Guard Service of the Russian Federation

The Simulation Model of Application Structural Interference in Order to Ensure Information Security of Data Processing and Information Display System

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 45 to 53

Authors: Aleksandr Gusarov, Mozhaisky Military Space Academy, Aleksandr Egin, Aleksandr Konovalov, Dmitriy Levin, Mozhaisky Military Space Academy, Mozhaisky Military Space Academy, Mozhaisky Military Space Academy

Methodical Providing Complex Management of Risks of Informational Security of Function-Oriented Information Resources Management Information Systems

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 61 to 71

Authors: Ilya Chucklyaev, Marshal of the Soviet Union A.M.Vasilevsky Army Air Defense Military Academy

Method of Localization in Underwater Acoustic Sensor Networks

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 54 to 60

Authors: Olga Gromashova, Pacific Oceanological Institute, Far Eastern Branch of the Russian Academy of Sciences, Inna Shcherbinina, G.I. Nevelskoi Maritime State University

Critical Objects. Terminology of Safety

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 72 to 76

Authors: Anatoliy Alpeev, Scientific and Technical Center for Nuclear and Radiation Safety

Issues of Protecting Business Information Systems from Botnets Attacks

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 20 to 28

Authors: Maxim Kosenko, Chelyabinsk State University, Andrey Melnikov, Chelyabinsk State University

Journal Issue published 2014 in Voprosy kiberbezopasnosti issue 1(2)

Guidelines for Cybersecurity in the Context of ISO 27032

Journal Article published 2014 in Voprosy kiberbezopasnosti issue 1(2) on pages 28 to 35

Authors: Alexey Markov, Valentin Tsirlov

Cryptography Basics: Becoming a CISSP

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 1(9) on pages 65 to 73

Authors: Alexey Markov, Bauman Moscow State Technical University, Valentin Tsirlov, NPO Echelon, JSC

Journal Issue published 2015 in Voprosy kiberbezopasnosti issue 2(10)

Information Security Access: Becoming a CISSP

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 2(10) on pages 60 to 68

Authors: Alexey Markov, Bauman Moscow State Technical University, Valentin Tsirlov, NPO Echelon, JSC