Funding Data Link References Status API Help
Page 1 of 9 results
Sort by: relevance publication year

Mapping the Application Security Terrain

Journal Article published 2014 in Voprosy kiberbezopasnosti issue 1(2) on pages 36 to 39

Authors: Gregory Reber, AsTech Consulting, Kenneth Malmquist, Alexey Shcherbakov, AsTech Consulting, AsTech Consulting

Method specifications subject area discipline based on ontological approach

Journal Article published 2014 in Voprosy kiberbezopasnosti issue 5(8) on pages 52 to 58

Authors: Seseg Bazaron, East Siberia State University of Technology and Management, Aleksandr Rukavichnikov, East Siberia State University of Technology and Management

The Systematisation of Types of Relationships and Responsibility in Acquiring Access to Information

Journal Article published 2014 in Voprosy kiberbezopasnosti issue 2(3) on pages 51 to 59

Authors: Andrey Fedichev, FBU the Scientific Center of Lawful Information with the RF Ministry of Justice, Sergey Artamoshin, RFM

Journal Issue published 2014 in Voprosy kiberbezopasnosti issue 2(3)

Journal Issue published 2014 in Voprosy kiberbezopasnosti issue 1(2)

Guidelines for Cybersecurity in the Context of ISO 27032

Journal Article published 2014 in Voprosy kiberbezopasnosti issue 1(2) on pages 28 to 35

Authors: Alexey Markov, Valentin Tsirlov

Nonmonotone Models of Reliability and Security of Software in the Early Stages of Testing

Journal Article published 2014 in Voprosy kiberbezopasnosti issue 2(3) on pages 10 to 17

Authors: Alexey Markov, Bauman Moscow State Technical University

Journal Issue published 2014 in Voprosy kiberbezopasnosti issue 5(8)

Methods of digital images creation and analysis of their aberrations

Journal Article published 2014 in Voprosy kiberbezopasnosti issue 5(8) on pages 43 to 46

Authors: Tatyana Damdinova, East Siberia State University of Technology and Management