№ 1 (19)

cybersecurity_2014

 

Content of 1st issue of magazine «Voprosy kiberbezopasnosti» at 2017:

Title Pages
APPLICATION OF THE THEORY OF OPPORTUNITIES IN THE MODELING OF INFORMATION SYSTEMS
Sherbakov Evgeniy, Korchagin Pavel
2-5
FUNCTIONAL MODEL FOR COMMUNICATION NETWORK WITH UNKNOWN ASSURANCE LEVEL AND EVALUATION OF ITS CAPABILITIES OF RENDERING VPN SERVICE OF THE SET QUALITY
Anisimov Vasiliy , Begaev Alexey , Starodubtsev Yurii
6-15
ITERATIVE METHOD FOR CLONE CODE DETECTION BASED ON COMPUTING THE EDIT DISTANCE
Kononov Dmitrii
16-21
CVE-2015-7547 EXPLOIT PARSING
Kasikin Alexey
22-30
STUDY INTO THE STRUCTURE OF THE SCIENTIFIC COATHORSHIP GRAPH USING SOCIAL NETWORK ANALYSIS
Basarab Mikhail, Glinskaya Elena, Ivanov Igor, Kolesnikov Aleksandr, Kuzovlev Vyacheslav
31-36
APPLICATION OF THE COMMUNITY ALLOCATION ALGORITHM IN THE INFORMATION CONFRONTATION IN THE SOCIAL NETWORKS
Chesnokov Vladislav
37-44
METHODS OF DESIGNING CRYPTOGRAPHIC HASH-FUNCTIONS BASED ON ITERATION OF THE UNIFORM CELLULAR AUTOMAT
Klyucharev Petr
45-50
ANALYSIS AND COMPARISON OF ELECTRONIC DIGITAL SIGNATURE ALGORITHMS GOST R 34.10-1994, GOST R 34.10-2001 AND GOST R 34.10-2012
Komarova Antonina, Menshchikov Aleksandr, Korobeynikov Anatoly
51-56
RECOGNITION OF A DISCRETE SIGNAL IN THE ADDITIVE NOISE FOR TWO DATA TRANSMISSION CHANNELS
Troitskii Igor, Yakubov Rustam
57-62
UP-TO-DATE REQUIREMENTS FOR SCIENTIFIC ARTICLES
Makarenko Grigory
63-66
BOOK REVIEW: SEVEN INFORMATION SECURITY TECHNOLOGIES
Petrenko Sergey
67-72

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.