№ 2 (15)

cybersecurity_2014

Content of 2nd issue of magazine «Voprosy kiberbezopasnosti» at 2016 :

Title Pages
ON DEVELOPMENT OF WEB APPLICATION VULNERABILITY ANALYSIS TECHNIQUE DURING SOFTWARE SECURITY EVALUATION
Barabanov Alexander, Fedichev Andrei
2-8
MODEL AND METHODS OF MULTI-CRITERIA SELECTION OF THE SECURITY CLASSES FOR OBJECTS IN DISTRIBUTED INFORMATION SYSTEM AND DATABASES PLACEMENT ON OBJECTS
Bykov Aleksandr, Panfilov Filipp, Zenkovich Stanislav
9-20
ROBUSTNESS DEVELOPMENT OF ANONYMOUS NETWORK BASED ON WEB-PROXY TECHNOLOGIES
Markin Dmitriy, Arhipov Pavel, Galkin Aleksey
21-28
ON IMPROVEMENT OF THE SELECTIVITY OF ONE ALGORITHM FOR DETERMINE MALWARE AUTHORSHIP
Kononov Dmitriy
29-35
HYPOTHESIS VERIFICATION ABOUT THE UNIFORM DISTRIBUTION OF HASH VALUES
Lebedenko Eugene, Ryabokon Vladimir
36-40
COVERING PROBLEM AND MATHEMATICAL MODELLING IN INFORMATION SECURITY
Gordeev Eduard
41-45
IMPROVING THE PROBABILITY-TIME CHARACTERISTICS OF THE 802.11-ENCAPSULATION PROTOCOLS
Yurkin Dmitri, Isachenkov Pavel, Patrikeev Anton
46-53
MODELING OF INDIVIDUAL AND GROUP BEHAVIOR OF PARTICIPIANTS OF MASS COMMUNICATION IN P-ADIC COORDINATE SYSTEMS IN ORDER TO INDICATE MENTAL CONTAMINATION LEVEL
Gnidko Konstantin, Lomako Aleksandr
54-68
SPECIAL CRITERIA FOR THE INFORMATION SECURITY OF THE PRELIMINARY INVESTIGATION BODY
Savchenko Oksana
69-76

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.