Search

Showing total 322 results

Search Constraints

Start Over You searched for: Language english Remove constraint Language: english Language russian Remove constraint Language: russian Journal безопасность информационных технологии Remove constraint Journal: безопасность информационных технологии
322 results

Search Results

51. Conceptual foundations for assessing the level of security of automated systems based on their vulnerability

52. Methodological and implementation aspects of introducing secure software development processes

53. Information Integrity checking methods for smartphones with Android operating system

54. Approaches to detection of malware using custom network protocols

55. Dose dependence of the spectral characteristics of sigma-delta analog-to-digital converters

56. On the informativeness of the extreme octave bands of the speech frequency range

57. Cryptographic mechanisms for secure interaction of control and measuring devices

58. DIGITAL VIDEO WATERMARKING

59. FPGA and digital SOIC SET’s control under heavy ion and proton irradiation

60. Software implementation of protection against unauthorized access

61. Functionality of the critical information infrastructure cybersecurity network

62. Assessment of the possibility of machine learning for electronic equipment quality prediction

63. Evaluation of statistical properties and cryptographic strength of random sequences obtained by an IBM quantum computer

64. Methodological approach to the integration of information resources in a distributed information processing system

65. The Methods of Information Security Based on Blurring of System

66. Hardware protection of UEFI-firmware and NVRAM of the computer with Resident Security Component

67. Sustainability of the functioning of critical information infrastructure facilities

68. Undocumented x86 instructions to control the CPU at the microarchitecture level in modern INTEL processors

69. Review of laser scanning methods for microelectronic semiconductor structures investigation

70. Methodological aspects of penetration testing automation for significant objects of critical information infrastructure

71. Socio-psychological techniques of information warfare

72. On the application of the vulnerability analysis method of the technological process of the production facility to ensure the information security of the automated process control system, taking into account the interrelation of components

73. UMPHE: A Library for Effective Computing On Encrypted Data

74. Using of asynchronous circuits to increase protection against side channels attacks

75. Indirect signs method for detecting hardware threats of technical means

76. Improving functional reliability of biometric identification systems by introducing redundancy

77. Specifics of Development and Implementation of Information Security Policies for Computer Networks

78. Privacy-preserving machine learning based on secure three-party computations

79. On the sustainability of logistics structures based on smart contracts

80. Algorithms of network data analysis in the disclosure of a tax crime scheme

81. Analysis of the components of the DisplayPort interface architecture that affect the side electromagnetic radiation

82. Soft tempest technology as an object of functional modeling

83. Network Security Centers as the GosSOPKA Forses

84. Assessment of the state of protection of information systems against malware

85. Comparative Analysis of Intrusion Detection Methods

86. Analysis of the Growth and Development of Acquiring Operations in Russia

87. The Method for creating a trusted hardware-software platform for its application in special purpose information systems

88. The use of polar harmonic transformations in the development of methods for robust image watermarking

89. Development of a related key function in ARX stochastic data transformation algorithms

90. Topical issues of creating a mass education system for information security culture

91. Сonvolutional neural networks in the diagnosis of skin neoplasms

92. Developing Scalable Information Security Systems

93. Combined Side Channel Attacks: breaking COMP128

94. Attack Graph Construction for Security Events Analysis

95. Evolution and paradoxes of the regulatory framework for ensuring the security of critical information infrastructure facilities

96. Method for identifying network covert channels

97. Implementation of a nonlinear transformation of a substitution in the form of elements of a numbering system of a number of factorial sets

98. A formalized model of an organization information security audit for compliance with the requirements of standards

99. Justification of network attacks time distribution in automated systems of internal affairs bodies based on a full-scale experiment

100. Medical information system based web technologies for the diagnosis of acute lymphoblastic leukemia and minimal residual disease