Search

Issue
Title
Authors
Protection of Valuable Information in Information Technologies
Grusho A.A., Grusho N.A., Zabezhaylo M.I., Timonina E.E.
Tasks of providing information security in distributed computing networks
Konoplev A.S., Kalinin M.O.
Cloud-Based Data Architecture Security
Semenov N.A., Poltavtsev A.A.
Generating optimized gate level information flow tracking logic for enforcing multilevel security
Tai Y., Hu W., Zhang H., Mu D., Huang X.
Cyber-physical system homeostatic security management
Zegzhda D.P., Pavlenko E.Y.
Modeling of information influence on remote wireless network devices
Suhoparov M.E., Bazhaev N.A., Krivtsova I.E., Lebedev I.S.
Hierarchical approach to analyzing security breaches in information systems
Pavlenko E.Y., Yarmak A.V., Moskvin D.A.
Information security of data channels based on a multifunctional tailored software and hardware solution
Sukhoparov M.E., Lebedev I.S., Korzhuk V.M., Krivtsova I.E.
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.A.
Digital Manufacturing Security Indicators
Zegzhda D.P., Pavlenko E.Y.
Model of Cyberattacks on Digital Production Systems
Pavlenko E.Y.
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Zaitseva E.A., Zegzhda D.P., Poltavtseva M.A.
Information security architecture synthesis in distributed information computation systems
Grusho A.A., Grusho N.A., Timonina E.E.
Management of information security risks in a context of uncertainty
Azhmukhamedov I.M., Vybornova O.N., Brumshtein Y.M.
Application of Systems Theory Laws for Investigating Information Security Problems
Volkova V.N., Chernyi Y.Y.
Intelligent data analysis in information security
Grusho A.A., Grusho N.A., Zabezhailo M.I., Timonina E.E.
A Question-Answering System for Applicant Support Using Modern Messaging Apps
Filonov D.R., Chalyy D.J., Murin D.M., Durnev V.G., Sokolov V.A.
A prototype computer with non-von Neumann architecture based on strategic domestic J7 microprocessor
Molyakov A.S.
Big Data Management System Security Threat Model
Poltavtseva M.A., Zegzhda D.P., Kalinin M.O.
Analysis of the Information Security Threats in the Digital Production Networks
Dakhnovich A.D., Moskvin D.A., Zegzhda D.P.
Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions
Baranov A.P., Baranov P.A.
Implementation of symmetric encryption by State Standard 28147–89 algorithm on a graphical processor
Sukhoparov M.E., Lebedev I.S.
Modeling Big Data Management Systems in Information Security
Poltavtseva M.A., Kalinin M.O.
Modeling the Dissemination of Information Threats in Social Media
Falcone I.I., Gatsenko O.Y.
Assessment of CRC error probability at minor distortion of information
Baranov A.P., Baranov P.A.
1 - 25 of 40 Items 1 2 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"