ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Journal influence

Higher Attestation Commission (VAK) - К1 quartile
Russian Science Citation Index (RSCI)

Bookmark

Next issue

2
Publication date:
17 June 2024

Keyword: infosecurity

  1. Authors: Гулиев Я.И.

  2. Web-server information security improvement with techniques of protection from investigation
  3. Authors: Семенкин Е.С., Стюгин М.А.

  4. Analysis of grid-systems information security architectural aspects
  5. Authors: Галатенко В.А.

  6. Method of construction the security model of automated systems
  7. Authors: Жуков В.Г., Жукова М.Н., Стефаров А.П.

  8. Vulnerability of web content protection of type HTML Guardian
  9. Authors: Ермаков Д.Г.

  10. Functional comparison of complex information security systems
  11. Authors: Стюгин М.А.

  12. Algorithms and technologies provide information safety in medical information system ExterNET
  13. Authors: Карабаев М.К., Абдуманонов А.А.

  14. Information security systems technique secured from researching
  15. Authors: Стюгин М.А.

  16. A model of the information security events choice based on fuzzy automata
  17. Authors: Борисов В.В., Гончаров М.М.

  18. The internet, gene pool, genome
  19. Authors: Осовецкий Л.Г.

  20. Development of access control model for the standard medical information system
  21. Authors: Оленников А.А., Оленников Е.А., Захаров А.А., Широких А.В., Варнавский В.В.

  22. Database security: problems and prospects
  23. Authors: Полтавцева М.А., Хабаров А.Р.

  24. Synthesis of protection systems of automated control systems against destroying program influence
  25. Authors: Дроботун Е.Б.

  26. Method of generating sets of alternative variants of building subsystems which are a part of a computer attack protection system
  27. Authors: Дроботун Е.Б., Угловский Е.П., Замалтдинов И.Ш.

  28. A system and legal model of information security (data protection)
  29. Authors: Голубчиков С.В., Новиков В.К., Баранова А.В.

  30. An automated system of information accessibility protecting from attacks by unauthorized traffic in UNIX-like systems
  31. Authors: Пальчевский Е.В., Халиков А.Р.

  32. The effectiveness of stage-by-stage use of securirty means crossing threat detection areas
  33. Authors: Коломойцев В.С., Богатырев В.А.

  34. An algorithm of information security residual risk assessment taking into account a protection mechanisms separation by types
  35. Authors: Дерендяев Д.А., Гатчин Ю.А., Безруков В.А.

  36. Web-robot detection method based on user’s navigation graph
  37. Authors: Гатчин Ю.А., Менщиков А.А.

  38. Development of a spiking neural network with the possibility of high-speed training to neutralize DDoS attacks
  39. Authors: Христодуло О.И., Пальчевский Е.В.

  40. Development of a geoinformation systems protecting method and spatial data based on a neural network
  41. Authors: Татарникова Т.М., Степанов С.Ю., Петров Я.А., Сидоренко А.Ю.

  42. Ontology processing in attributive access control in cyber-physical systems
  43. Authors: Полтавцева М.А.

  44. A software package prototype for analyzing user accounts in social networks: Django web framework
  45. Authors: Олисеенко В.Д., Абрамов М.В., Тулупьев А.Л., Иванов К.А.

  46. Developing a password generator using GUI MATLAB
  47. Authors: Щукарев И.А., Маркова Е.В.

  48. DIY DDoS Protection: operational development and implementation of the service in the National Research Computer Network of Russia
  49. Authors: Абрамов А.Г.

  50. Developing a software tool for constructing a social graph of a social network user in the task of analyzing its security from multi-pass social engineering attacks
  51. Authors: Абрамов М.В., Хлобыстова А.О., Сазанов В.А.

  52. USB connections control in the local network of computers running under Astra Linux SE
  53. Authors: Баранов А.В., Корепанов П.М., Лепешев И.А.

  54. Information security of a supercomputer center
  55. Authors: Баранов А.В., Корепанов П.М., Кузнецов Е.Е.