Funding Data Link References Status API Help
Page 1 of 113 results
Sort by: relevance publication year

Book review of National Early Warning System for Cyber-Attack by S.Petrenko and D.Stupin

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 4(22) on pages 67 to 74

Authors: Alexey Markov, NPO Echelon, JSC

The Degree of Confidence of Software and Hardware as a Measure of Quality Import Substitution

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 4(22) on pages 2 to 9

Authors: Anatoly Zakharenkov, FGUP ", Igor Butusov, Aleksandr Romanov, Concern SYSTEMPROM", FGUP "Concern SYSTEMPROM", FGUP "Concern SYSTEMPROM"

Using Smart Cards in Telemedical Systems

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 4(22) on pages 40 to 46

Authors: Tatyana Buldakova, Bauman Moscow State Technical University, Anna Lantsberg, Kristina Smolyaninova, Institute of Precision Mechanics and Control of the Russian Academy of Sciences, Bauman Moscow State Technical University

Methodology of Information Protection Efficiency Estimation at the Operation of Mobile Subscribers in Corporate Networks with Different Security Requirements

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 4(22) on pages 21 to 31

Authors: Dmitrij Markin, FSS, Vladimir Komashinskij, Igor Senotrusov, FSS, FSS

Journal Issue published 2017 in Voprosy kiberbezopasnosti issue 4(22)

The Building of Model of the Protection System in Cloud Technologies Based on Multi-Agent Approach Using the Automatic Model

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 4(22) on pages 10 to 20

Authors: Alexander Borovki, Orenburg State University, FSFEI HE, Elena Ryapolova, Orenburg State University, FSFEI HE

The Method of Assessing the Controllability of a Fragment of the Communication Network of General Use Taking into Account the Influence of Multiple Centers of Control and Destructive Software Impacts

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 4(22) on pages 32 to 39

Authors: Alexey Begaev, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Yuriy Starodubtsev, Vadim Fedorov, Peter the Great St.Petersburg Polytechnic University, Federal State Public Educational Institution of Higher Professional Education Military Telecommunication Academy named after the Soviet Union Marshal Budienny S. M.

Cellular Automata in Cryptography. Part 2.

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 4(22) on pages 47 to 66

Authors: Alexei Zhukov, International Association for Cryptologic Research (Russian Regional Association - RusCrypto)

First Order Logic for Program Code Functional Requirements Description

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 3(21) on pages 2 to 7

Authors: Aleksandr Kozachok, The Academy of the Federal Guard Service of the Russian Federation, Maxim Bochkov, Tuan Lai Minh, Evgeniy Kochetkov, Business Risk Educational Center, The Academy of Cryptographic Techniques, The Academy of the Federal Guard Service of the Russian Federation

Mapping the Application Security Terrain

Journal Article published 2014 in Voprosy kiberbezopasnosti issue 1(2) on pages 36 to 39

Authors: Gregory Reber, AsTech Consulting, Kenneth Malmquist, Alexey Shcherbakov, AsTech Consulting, AsTech Consulting

Journal Issue published 2016 in Voprosy kiberbezopasnosti issue 3(16)

Proposals for Access Control to Information Resources of Computer Networks Different Levels of Privacy

Journal Article published 2016 in Voprosy kiberbezopasnosti issue 3(16) on pages 13 to 17

Authors: Yuriy Starodubtsev, Military Telecommunication Academy, Alexey Begaev, Alexander Kozachok, NW Echelon, The Academy of the Federal Guard Service of the Russian Federation

The Choice of Strategy for the Spurious Information System on the Basis of the Game Theory Model

Journal Article published 2015 in Voprosy kiberbezopasnosti issue 5(13) on pages 36 to 40

Authors: Elena Shmatova, Bauman Moscow State Technical University

Method specifications subject area discipline based on ontological approach

Journal Article published 2014 in Voprosy kiberbezopasnosti issue 5(8) on pages 52 to 58

Authors: Seseg Bazaron, East Siberia State University of Technology and Management, Aleksandr Rukavichnikov, East Siberia State University of Technology and Management

The Systematisation of Types of Relationships and Responsibility in Acquiring Access to Information

Journal Article published 2014 in Voprosy kiberbezopasnosti issue 2(3) on pages 51 to 59

Authors: Andrey Fedichev, FBU the Scientific Center of Lawful Information with the RF Ministry of Justice, Sergey Artamoshin, RFM

Journal Issue published 2013 in Voprosy kiberbezopasnosti issue 1(1)

Organizational and Technical Problems of Protection Against Targeted Malware Such as Stuxnet

Journal Article published 2013 in Voprosy kiberbezopasnosti issue 1(1) on pages 28 to 36

Authors: Alexey Markov, Bauman Moscow State Technical University, Andrey Fadin, NPO Echelon, JSC

Опыт выявления уязвимостей в зарубежных программных продуктах

Journal Article published 2013 in Voprosy kiberbezopasnosti issue 1(1) on pages 42 to 48

Authors: Alexey Markov, Bauman Moscow State Technical University, Valentin Tsirlov, Bauman Moscow State Technical University

Journal Issue published 2017 in Voprosy kiberbezopasnosti issue 5(24)

Investigation of the Use of Neural Networks for Detecting Low-Intensive DDоS-Atak of Applied Level

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 5(24) on pages 23 to 29

Authors: Yaroslav Tarasov, CJSC Jet Infosystems