🔧На сайте запланированы технические работы
25.12.2025 в промежутке с 18:00 до 21:00 по Московскому времени (GMT+3) на сайте будут проводиться плановые технические работы. Возможны перебои с доступом к сайту. Приносим извинения за временные неудобства. Благодарим за понимание!
🔧Site maintenance is scheduled.
Scheduled maintenance will be performed on the site from 6:00 PM to 9:00 PM Moscow time (GMT+3) on December 25, 2025. Site access may be interrupted. We apologize for the inconvenience. Thank you for your understanding!

 

检索

标题
作者
Protection of Valuable Information in Information Technologies
Grusho A., Grusho N., Zabezhaylo M., Timonina E.
Cyber-physical system homeostatic security management
Zegzhda D., Pavlenko E.
Tasks of providing information security in distributed computing networks
Konoplev A., Kalinin M.
Cloud-Based Data Architecture Security
Semenov N., Poltavtsev A.
Generating optimized gate level information flow tracking logic for enforcing multilevel security
Tai Y., Hu W., Zhang H., Mu D., Huang X.
Modeling of information influence on remote wireless network devices
Suhoparov M., Bazhaev N., Krivtsova I., Lebedev I.
Hierarchical approach to analyzing security breaches in information systems
Pavlenko E., Yarmak A., Moskvin D.
Information security of data channels based on a multifunctional tailored software and hardware solution
Sukhoparov M., Lebedev I., Korzhuk V., Krivtsova I.
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Zaitseva E., Zegzhda D., Poltavtseva M.
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.
Digital Manufacturing Security Indicators
Zegzhda D., Pavlenko E.
Model of Cyberattacks on Digital Production Systems
Pavlenko E.
Information security architecture synthesis in distributed information computation systems
Grusho A., Grusho N., Timonina E.
Management of information security risks in a context of uncertainty
Azhmukhamedov I., Vybornova O., Brumshtein Y.
Application of Systems Theory Laws for Investigating Information Security Problems
Volkova V., Chernyi Y.
Intelligent data analysis in information security
Grusho A., Grusho N., Zabezhailo M., Timonina E.
Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem
Salakhutdinova K., Lebedev I., Krivtsova I., Sukhoparov M.
Token scanning as a new scientific approach in the creation of protected systems: A new generation OS MICROTEK
Molyakov A.
A Question-Answering System for Applicant Support Using Modern Messaging Apps
Filonov D., Chalyy D., Murin D., Durnev V., Sokolov V.
A prototype computer with non-von Neumann architecture based on strategic domestic J7 microprocessor
Molyakov A.
Big Data Management System Security Threat Model
Poltavtseva M., Zegzhda D., Kalinin M.
Analysis of the Information Security Threats in the Digital Production Networks
Dakhnovich A., Moskvin D., Zegzhda D.
Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions
Baranov A., Baranov P.
Implementation of symmetric encryption by State Standard 28147–89 algorithm on a graphical processor
Sukhoparov M., Lebedev I.
Modeling Big Data Management Systems in Information Security
Poltavtseva M., Kalinin M.
1 - 25 的 40 信息 1 2 > >> 

检索提示:

  • 检索的名词区分大小写
  • 常用字词将被忽略
  • 默认情况下只有在查询结果满足所有检索词才返回(例如,隐含AND)
  • 使用OR结合多个检索词,便于查找含有这些检索词的文章,例如education OR research
  • 使用括号来创建更复杂的查询; 例如:archive ((journal OR conference) NOT theses)
  • 使用引号检索一个完整的词组; 例如: "open access publishing"
  • 使用-或者NOT排除一个检索词; 例如:online -politics or online NOT politics
  • 在检索词里使用 *作为通配符匹配任何字符序列; 例如., soci* morality 将符合含有 "sociological" or "societal"的词语