Funding Data Link References Status API Help
Page 1 of 55 results
Sort by: relevance publication year

Mapping the Application Security Terrain

Journal Article published 2014 in Voprosy kiberbezopasnosti issue 1(2) on pages 36 to 39

Authors: Gregory Reber, AsTech Consulting, Kenneth Malmquist, Alexey Shcherbakov, AsTech Consulting, AsTech Consulting

Reference Quality Assessment of the Digitized Static Images and Video Signals in the Security Systems

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 2(20) on pages 61 to 74

Authors: Alexey Filippov, Huawei Technologies Ltd., Boris Shakhtarin, Bauman Moscow State Technical University

Efficiency of Steganalysis Based on Machine-Learning Methods

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 2(20) on pages 53 to 60

Authors: Aleksei Sivachev, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Nikolai Prokhozhev, Olga Mikhailichenko, Daniil Bashmakov, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics

Application of the Theory of Opportunities in the Modeling of Information Systems

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 2 to 5

Authors: Evgeniy Sherbakov, Federal State Military Educational Institution of Higher Professional Education «Military Aerospace Defense Academy named after Marshal of the Soviet Union G.K. Zhukov» of the Russian Federation Department of Defense, Pavel Korchagin, Mozhaisky Military Space Academy

Application of the Community Allocation Algorithm in the Information Confrontation in the Social Networks

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 37 to 44

Authors: Vladislav Chesnokov, Bauman Moscow State Technical University

Recognition of a Discrete Signal in the Additive Noise for Two Data Transmission Channels

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 57 to 62

Authors: Igor Troitskii, Bauman Moscow State Technical University, Rustam Yakubov, Bauman Moscow State Technical University

Functional Model for Communication Network with Unknown Assurance Level and Evaluation of Its Capabilities of Rendering VPN Service of the Set Quality

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 6 to 15

Authors: Vasiliy Anisimov, Federal State Public Educational Institution of Higher Professional Education Military Telecommunication Academy named after the Soviet Union Marshal Budienny S. M., Alexey Begaev, Yurii Starodubtsev, Saint-Petersburg National Research University of Information Technologies, Mechanics and Optics, Peter the Great St.Petersburg Polytechnic University

Iterative Method for Clone Code Detection Based on Computing the Edit Distance

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 16 to 21

Authors: Dmitrii Kononov, FGUP «18 CNII» MO RF

Up-to-date Requirements for Scientific Articles

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 63 to 66

Authors: Grigory Makarenko, FBU SCLI

CVE-2015-7547 Exploit Parsing

Journal Article published 2017 in Voprosy kiberbezopasnosti issue 1(19) on pages 22 to 30

Authors: Alexey Kasikin, Bauman Moscow State Technical University