Search

Issue
Title
Authors
Tasks of providing information security in distributed computing networks
Konoplev A.S., Kalinin M.O.
Cloud-Based Data Architecture Security
Semenov N.A., Poltavtsev A.A.
Generating optimized gate level information flow tracking logic for enforcing multilevel security
Tai Y., Hu W., Zhang H., Mu D., Huang X.
Cyber-physical system homeostatic security management
Zegzhda D.P., Pavlenko E.Y.
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Zaitseva E.A., Zegzhda D.P., Poltavtseva M.A.
Modeling of information influence on remote wireless network devices
Suhoparov M.E., Bazhaev N.A., Krivtsova I.E., Lebedev I.S.
Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures
Grusho N.A.
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.A.
Hierarchical approach to analyzing security breaches in information systems
Pavlenko E.Y., Yarmak A.V., Moskvin D.A.
Protection of Valuable Information in Information Technologies
Grusho A.A., Grusho N.A., Zabezhaylo M.I., Timonina E.E.
Model of Cyberattacks on Digital Production Systems
Pavlenko E.Y.
Security evaluation of a wireless ad-hoc network with dynamic topology
Kalinin M.O., Minin A.A.
Digital Manufacturing Security Indicators
Zegzhda D.P., Pavlenko E.Y.
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers
Pankov I.D., Konoplev A.S., Chernov A.Y.
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Dakhnovich A.D., Zegzhda D.P., Moskvin D.A.
Cyber-sustainability of Software-Defined Networks Based on Situational Management
Zegzhda D.P., Pavlenko E.Y.
Identifying a potential insider using classification models
Zaytsev A.S., Malyuk A.A.
Assessment of CRC error probability at minor distortion of information
Baranov A.P., Baranov P.A.
Design and Security Analysis of a Fragment of Internet of Things Telecommunication System
Alexandrov V.A., Desnitsky V.A., Chaly D.Y.
The Problem of Innovative Development of Information Security Systems in the Transport Sector
Anisimov V.G., Anisimov E.G., Zegzhda P.D., Suprun A.F.
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security
Demidov R.A., Pechenkin A.I., Zegzhda P.D., Kalinin M.O.
X-PACE: Modified Password Authenticated Connection Establishment protocol
Shenets N.N., Trukhina E.E.
Systematization and security assessment of cyber-physical systems
Zegzhda D.P., Poltavtseva M.A., Lavrova D.S.
Asymptotic assessments of CRC error probabilities in some telecommunication protocols
Baranov A.P., Baranov P.A.
Management of information security risks in a context of uncertainty
Azhmukhamedov I.M., Vybornova O.N., Brumshtein Y.M.
1 - 25 of 69 Items 1 2 3 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"