Article

Issue Title File
Vol 52, No 1 (2018) Improving Medical CT Image Blind Restoration Algorithm Based on Dictionary Learning by Alternating Direction Method of Multipliers PDF
(Eng)
Sun Y., Fei T., Zhang L., Liu X., Zhang J.
Vol 52, No 1 (2018) Analysis of Cumulative Distribution Function of the Response Time in Cloud Computing Systems with Dynamic Scaling PDF
(Eng)
Sopin E.S., Gorbunova A.V., Gaidamaka Y.V., Zaripova E.R.
Vol 52, No 1 (2018) A Hybrid Genetic and Ant Colony Algorithm for Finding the Shortest Path in Dynamic Traffic Networks PDF
(Eng)
Zhang S., Zhang Y.
Vol 51, No 8 (2017) Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing PDF
(Eng)
Shenets N.N.
Vol 51, No 8 (2017) Elliptic curves generation for isogeny-based cryptosystems PDF
(Eng)
Aleksandrova E.B., Shtyrkina A.A., Yarmak A.V.
Vol 51, No 8 (2017) Data protection in radio channels of local differential satellite navigation subsystems PDF
(Eng)
Sikarev I.A., Shakhnov S.F.
Vol 51, No 8 (2017) Detection of encrypted executable files based on entropy analysis to determine the randomness measure of byte sequences PDF
(Eng)
Alekseev I.V., Platonov V.V.
Vol 51, No 8 (2017) Architectures for building secure vehicular networks based on SDN technology PDF
(Eng)
Kalinin M.O., Krundyshev V.M., Semianov P.V.
Vol 51, No 8 (2017) Approaches to detecting active network nodes in IPv6 address space PDF
(Eng)
Ivanov D.V., Moskvin D.A., Ovasapyan T.D.
Vol 51, No 8 (2017) Methods of group authentication for low-resource vehicle and flying self-organizing networks PDF
(Eng)
Aleksandrova E.B.
Vol 51, No 8 (2017) Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions PDF
(Eng)
Baranov A.P., Baranov P.A.
Vol 51, No 8 (2017) A method of providing the integrity of information in the group of robotic engineering complexes based on crypt-code constructions PDF
(Eng)
Samoylenko D.V., Eremeev M.A., Finko O.A.
Vol 51, No 8 (2017) X-PACE: Modified Password Authenticated Connection Establishment protocol PDF
(Eng)
Shenets N.N., Trukhina E.E.
Vol 51, No 8 (2017) Protection of Wi-Fi network users against rogue access points PDF
(Eng)
Zegzhda D.P., Moskvin D.A., Dakhnovich A.D.
Vol 51, No 8 (2017) Intelligent data analysis in decision support systems for penetration tests PDF
(Eng)
Poltavtseva M.A., Pechenkin A.I.
Vol 51, No 8 (2017) Modeling of information influence on remote wireless network devices PDF
(Eng)
Suhoparov M.E., Bazhaev N.A., Krivtsova I.E., Lebedev I.S.
Vol 51, No 8 (2017) Analysis of the constructing principles and methodology for evaluating the security of shoulder-surfing resistant graphic passwords PDF
(Eng)
Yakovlev V.A., Arkhipov V.V., Adadurov S.E.
Vol 51, No 8 (2017) Security evaluation of a wireless ad-hoc network with dynamic topology PDF
(Eng)
Kalinin M.O., Minin A.A.
Vol 51, No 8 (2017) An adaptive model of a distributed intrusion detection system PDF
(Eng)
Platonov V.V., Semenov P.O.
Vol 51, No 8 (2017) Cyber-physical system homeostatic security management PDF
(Eng)
Zegzhda D.P., Pavlenko E.Y.
Vol 51, No 8 (2017) An ontological model of the domain of applications for the Internet of Things in analyzing information security PDF
(Eng)
Lavrova D.S., Vasil’ev Y.S.
Vol 51, No 8 (2017) Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects PDF
(Eng)
Anisimov V.G., Anisimov E.G., Zegzhda P.D., Saurenko T.N., Prisyazhnyuk S.P.
Vol 51, No 8 (2017) Hierarchical approach to analyzing security breaches in information systems PDF
(Eng)
Pavlenko E.Y., Yarmak A.V., Moskvin D.A.
Vol 51, No 8 (2017) Systematization and security assessment of cyber-physical systems PDF
(Eng)
Zegzhda D.P., Poltavtseva M.A., Lavrova D.S.
Vol 51, No 8 (2017) The task of building a trusted computing environment on the Intel hardware platform PDF
(Eng)
Chernov A.Y., Konoplev A.S., Reshetov D.V.
251 - 275 of 463 Items << < 6 7 8 9 10 11 12 13 14 15 > >>