ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Publication activity

(Information on the results of 2021)
2-year impact factor of the RSCI: 0,441
2-year impact factor of the RSCI without self-citation: 0,408
The two-year impact factor of the RSCI, taking into account citations from all
sources: 0,704
5-year impact factor of the RSCI: 0,417
5-year impact factor of the RSCI without self-citation: 0,382
The total number of citations of the journal in the RSCI: 9837
Herfindahl's five-year index of quoting journals: 149
Herfindahl Index by author organizations: 384
10-year Hirsch Index: 71
Place in the overall SCIENCE INDEX ranking: 151
Place in the SCIENCE INDEX ranking on the topic "Automation. Computer technology": 6

More information on the publication activity of our journal for 2008-2021 on the RSCI website.

Bookmark

Next issue

4
Publication date:
25 September 2022

Keyword: infosecurity

  1. Authors: Гулиев Я.И.

  2. Web-server information security improvement with techniques of protection from investigation
  3. Authors: Семенкин Е.С., Стюгин М.А.

  4. Analysis of grid-systems information security architectural aspects
  5. Authors: Галатенко В.А.

  6. Method of construction the security model of automated systems
  7. Authors: Жуков В.Г., Жукова М.Н., Стефаров А.П.

  8. Vulnerability of web content protection of type HTML Guardian
  9. Authors: Ермаков Д.Г.

  10. Functional comparison of complex information security systems
  11. Authors: Стюгин М.А.

  12. Algorithms and technologies provide information safety in medical information system ExterNET
  13. Authors: Карабаев М.К., Абдуманонов А.А.

  14. Information security systems technique secured from researching
  15. Authors: Стюгин М.А.

  16. A model of the information security events choice based on fuzzy automata
  17. Authors: Борисов В.В., Гончаров М.М.

  18. The internet, gene pool, genome
  19. Authors: Осовецкий Л.Г.

  20. Development of access control model for the standard medical information system
  21. Authors: Оленников А.А., Оленников Е.А., Захаров А.А., Широких А.В., Варнавский В.В.

  22. Database security: problems and prospects
  23. Authors: Полтавцева М.А., Хабаров А.Р.

  24. Synthesis of protection systems of automated control systems against destroying program influence
  25. Authors: Дроботун Е.Б.

  26. Method of generating sets of alternative variants of building subsystems which are a part of a computer attack protection system
  27. Authors: Дроботун Е.Б., Угловский Е.П., Замалтдинов И.Ш.

  28. A system and legal model of information security (data protection)
  29. Authors: Голубчиков С.В., Новиков В.К., Баранова А.В.

  30. An automated system of information accessibility protecting from attacks by unauthorized traffic in UNIX-like systems
  31. Authors: Пальчевский Е.В., Халиков А.Р.

  32. The effectiveness of stage-by-stage use of securirty means crossing threat detection areas
  33. Authors: Коломойцев В.С., Богатырев В.А.

  34. An algorithm of information security residual risk assessment taking into account a protection mechanisms separation by types
  35. Authors: Дерендяев Д.А., Гатчин Ю.А., Безруков В.А.

  36. Web-robot detection method based on user’s navigation graph
  37. Authors: Гатчин Ю.А., Менщиков А.А.

  38. Development of a spiking neural network with the possibility of high-speed training to neutralize DDoS attacks
  39. Authors: Христодуло О.И., Пальчевский Е.В.

  40. Development of a geoinformation systems protecting method and spatial data based on a neural network
  41. Authors: Татарникова Т.М., Степанов С.Ю., Петров Я.А., Сидоренко А.Ю.

  42. Ontology processing in attributive access control in cyber-physical systems
  43. Authors: Полтавцева М.А.

  44. A software package prototype for analyzing user accounts in social networks: Django web framework
  45. Authors: Олисеенко В.Д., Абрамов М.В., Тулупьев А.Л., Иванов К.А.

  46. Developing a password generator using GUI MATLAB
  47. Authors: Щукарев И.А., Маркова Е.В.