Funding Data Link References Status API Help
Page 4 of 74 results
Sort by: relevance publication year

Application of Operating Systems with Open Source Code in of Communication Equipment for Networks with Commutation of Packages

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 36 to 44

Authors: Dmitry Vasinev, The Academy of Federal Security Guard Service of the Russian Federation

Methodical Providing Complex Management of Risks of Informational Security of Function-Oriented Information Resources Management Information Systems

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 61 to 71

Authors: Ilya Chucklyaev, Marshal of the Soviet Union A.M.Vasilevsky Army Air Defense Military Academy

Method of Localization in Underwater Acoustic Sensor Networks

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 54 to 60

Authors: Olga Gromashova, Pacific Oceanological Institute, Far Eastern Branch of the Russian Academy of Sciences, Inna Shcherbinina, G.I. Nevelskoi Maritime State University

The Simulation Model of Application Structural Interference in Order to Ensure Information Security of Data Processing and Information Display System

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 45 to 53

Authors: Aleksandr Gusarov, Mozhaisky Military Space Academy, Aleksandr Egin, Aleksandr Konovalov, Dmitriy Levin, Mozhaisky Military Space Academy, Mozhaisky Military Space Academy, Mozhaisky Military Space Academy

Critical Objects. Terminology of Safety

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 4(17) on pages 72 to 76

Authors: Anatoliy Alpeev, Scientific and Technical Center for Nuclear and Radiation Safety

Journal Issue published 2014 in Voprosy kiberbezopasnosti issue 1(2)

Guidelines for Cybersecurity in the Context of ISO 27032

Journal Article published 2014 in Voprosy kiberbezopasnosti issue 1(2) on pages 28 to 35

Authors: Alexey Markov, Valentin Tsirlov

Journal Issue published 2015 in Voprosy kiberbezopasnosti issue 1(9)

Journal Issue published 2015 in Voprosy kiberbezopasnosti issue 2(10)

Information Security Access: Becoming a CISSP

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 2(10) on pages 60 to 68

Authors: Alexey Markov, Bauman Moscow State Technical University, Valentin Tsirlov, NPO Echelon, JSC