Content of 1st issue of magazine «Voprosy kiberbezopasnosti» at 2017:
Title |
Pages |
APPLICATION OF THE THEORY OF OPPORTUNITIES IN THE MODELING OF INFORMATION SYSTEMS
Sherbakov Evgeniy, Korchagin Pavel |
2-5 |
FUNCTIONAL MODEL FOR COMMUNICATION NETWORK WITH UNKNOWN ASSURANCE LEVEL AND EVALUATION OF ITS CAPABILITIES OF RENDERING VPN SERVICE OF THE SET QUALITY
Anisimov Vasiliy , Begaev Alexey , Starodubtsev Yurii |
6-15 |
ITERATIVE METHOD FOR CLONE CODE DETECTION BASED ON COMPUTING THE EDIT DISTANCE
Kononov Dmitrii |
16-21 |
CVE-2015-7547 EXPLOIT PARSING
Kasikin Alexey |
22-30 |
STUDY INTO THE STRUCTURE OF THE SCIENTIFIC COATHORSHIP GRAPH USING SOCIAL NETWORK ANALYSIS
Basarab Mikhail, Glinskaya Elena, Ivanov Igor, Kolesnikov Aleksandr, Kuzovlev Vyacheslav |
31-36 |
APPLICATION OF THE COMMUNITY ALLOCATION ALGORITHM IN THE INFORMATION CONFRONTATION IN THE SOCIAL NETWORKS
Chesnokov Vladislav |
37-44 |
METHODS OF DESIGNING CRYPTOGRAPHIC HASH-FUNCTIONS BASED ON ITERATION OF THE UNIFORM CELLULAR AUTOMAT
Klyucharev Petr |
45-50 |
ANALYSIS AND COMPARISON OF ELECTRONIC DIGITAL SIGNATURE ALGORITHMS GOST R 34.10-1994, GOST R 34.10-2001 AND GOST R 34.10-2012
Komarova Antonina, Menshchikov Aleksandr, Korobeynikov Anatoly |
51-56 |
RECOGNITION OF A DISCRETE SIGNAL IN THE ADDITIVE NOISE FOR TWO DATA TRANSMISSION CHANNELS
Troitskii Igor, Yakubov Rustam |
57-62 |
UP-TO-DATE REQUIREMENTS FOR SCIENTIFIC ARTICLES
Makarenko Grigory |
63-66 |
BOOK REVIEW: SEVEN INFORMATION SECURITY TECHNOLOGIES
Petrenko Sergey |
67-72 |
Leave a Reply