| |
| Issue |
Title |
| |
| Vol 52, No 3 (2025) |
Methodology for selecting effectiveness criteria of information Security Systems during Red Team simulated attacks |
Abstract
PDF (Rus)
|
|
S. A. Reznichenko, D. R. Turabov |
| |
| Vol 52, No 3 (2025) |
Development of an interface for calculating the non-sinusoidal coefficient with adaptive window Fourier transform and the power part of the active filter in the high-voltage network of a mining and processing plant |
Abstract
PDF (Rus)
|
|
G. A. Falkov |
| |
| Vol 52, No 3 (2025) |
Finite Element method application for Assessing the performance of pipelines with Geometrical defects |
Abstract
PDF (Rus)
|
|
R. A. Khuramshina, D. A. Gaizullin |
| |
| Vol 52, No 3 (2025) |
Optimization of the layout of construction objects in space by the generative design method using the DYNAMO STUDIO development environment |
Abstract
PDF (Rus)
|
|
T. A. Yurosheva |
| |
| Vol 52, No 3 (2025) |
Basic approaches to assessing the Security of Information Systems and prospects for their application in the internal affairs agencies of the Russian Federation |
Abstract
PDF (Rus)
|
|
A. I. Yangirov, A. S. Cherkasova, A. O. Efimov, E. A. Rogozin, S. B. Akhlyustin |
| |
| Vol 52, No 3 (2025) |
Organizational and technical systems – work analysis and research methodology |
Abstract
PDF (Rus)
|
|
A. V. Melnikov, A. O. Zheleznyakov, R. A. Zhilin |
| |
| Vol 52, No 3 (2025) |
Optimization of PI controller tuning in automatic control systems for complex technological processes at Nuclear Power Plants |
Abstract
PDF (Rus)
|
|
D. S. Meniuk |
| |
| Vol 52, No 3 (2025) |
Organization and methodology of an experiment to determine initial data for assessing software security indicators for automated systems of internal affairs agencies |
Abstract
PDF (Rus)
|
|
A. D. Popova, I. G. Drovnikova, A. D. Popov |
| |
| Vol 52, No 3 (2025) |
Slowloris DDoS Defense Mechanism |
Abstract
PDF (Rus)
|
|
P. V. Razumov, L. V. Cherkesova, E. A. Revyakina |
| |
| Vol 52, No 3 (2025) |
Monte Carlo simulation of reliability of electronic components of very large-scale integrated circuits |
Abstract
PDF (Rus)
|
|
T. I. Isabekova, S. E. Savzikhanova |
| |
| Vol 52, No 3 (2025) |
Automating the Process of Assessing the Technical Condition of Exterior Walls of Brick Buildings Using Machine Learning |
Abstract
PDF (Rus)
|
|
S. A. Krylov, G. G. Kashevarova |
| |
| Vol 52, No 3 (2025) |
On the issue of ensuring information Security requirements at the University |
Abstract
PDF (Rus)
|
|
I. I. Livshits |
| |
| Vol 52, No 3 (2025) |
Application of a Genetic algorithm for the rational placement of Rectangular items |
Abstract
PDF (Rus)
|
|
M. V. Mairamty |
| |
| Vol 52, No 3 (2025) |
Algorithms for Modules Implementing Amplitude Impulse Modulation |
Abstract
PDF (Rus)
|
|
N. L. Grechkin, E. Yu. Vataeva |
| |
| Vol 52, No 3 (2025) |
Modification of the Random Forest Algorithm for Selecting Investment Instruments |
Abstract
PDF (Rus)
|
|
A. V. Zinenko |
| |
| Vol 52, No 3 (2025) |
Asymmetric S-curves for predicting the dynamics of new technology diffusion |
Abstract
PDF (Rus)
|
|
A. V. Mandrik, A. S. Glukhanov |
| |
| Vol 52, No 2 (2025) |
A method of processing expert data for constructing empirical mathematical models of complex systems operating in unstable environments |
Abstract
PDF (Rus)
|
|
N. L. Balamirzoev, V. B. Melekhin |
| |
| Vol 52, No 2 (2025) |
Information security incident management and analysis service |
Abstract
PDF (Rus)
|
|
O. Yu. Basharina, E. V. Butsenko, A. S. Eremeev |
| |
| Vol 52, No 2 (2025) |
A hybrid method for modeling artificial intelligence systems to detect cyberattacks |
Abstract
PDF (Rus)
|
|
A. I. Dubrovina |
| |
| Vol 52, No 2 (2025) |
A new method for determining the characteristics of block algorithms |
Abstract
PDF (Rus)
|
|
V. A. Egunov |
| |
| Vol 52, No 2 (2025) |
Causes, classification, and criticality of information system software vulnerabilities |
Abstract
PDF (Rus)
|
|
A. O. Efimov |
| |
| Vol 52, No 2 (2025) |
Security threat protection strategies: development of a cybersecurity system |
Abstract
PDF (Rus)
|
|
G. I. Kachaeva, N. G. Sultanov |
| |
| Vol 52, No 2 (2025) |
Combination of systems for recognition and tracking of anomalous objects in telecommunication systems |
Abstract
PDF (Rus)
|
|
D. A. Kryukova, S. D. Shibaikin, V. V. Nikulin, S. R. Baibikova, N. O. Surkov, V. Yu. Kozyaykin |
| |
| Vol 52, No 2 (2025) |
Protection of commercial information flows in an industrial enterprise |
Abstract
PDF (Rus)
|
|
I. A. Loskutov, S. E. Akatov |
| |
| Vol 52, No 2 (2025) |
Practical recommendations for assessing software security and choosing its optimal version for use at facilities of informatization of internal affairs agencies |
Abstract
PDF (Rus)
|
|
A. D. Popova, I. G. Drovnikova |
| |
| Vol 52, No 2 (2025) |
Protection mechanism against ddos attack intended to block account |
Abstract
PDF (Rus)
|
|
P. V. Razumov, L. V. Cherkesova, E. A. Revyakina, A. A. Klevtsov |
| |
| Vol 52, No 2 (2025) |
Methodology of load testing of firewalling tools |
Abstract
PDF (Rus)
|
|
A. M. Sadykov, R. R. Yamaletdinov |
| |
| Vol 52, No 2 (2025) |
Intelligent analysis of smoke formation processes in fires: new approaches based on AI technologies |
Abstract
PDF (Rus)
|
|
M. V. Shevtsov, A. N. Denisov, M. V. Ivanov, A. A. Kozlov |
| |
| Vol 52, No 2 (2025) |
Mathematical model for quantitative assessment of the Security of open operating systems when selecting in the AS of the Internal Affairs Bodies |
Abstract
PDF (Rus)
|
|
A. I. Yangirov, E. A. Rogozin, P. M. Duplyakin, T. V. Meshcheryakova, A. O. Efimov |
| |
| Vol 52, No 1 (2025) |
Influence of the human-machine-environment system on reliability automated systems IAB of the Russian Federation |
Abstract
PDF (Rus)
|
|
A. I. Yangirov, I. M. Yangirov, I. G. Drovnikova, V. R. Romanova, P. M. Duplyakin |
| |
| Vol 52, No 1 (2025) |
Comparative analysis of frameworks for mobile application development: native, hybrid or cross-platform solutions |
Abstract
PDF (Rus)
|
|
A. B. Temirova |
| |
| Vol 52, No 1 (2025) |
Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification |
Abstract
PDF (Rus)
|
|
L. V. Cherkesova, V. A. Savelyev, E. A. Revyakina, A. R. Polulyakh, M. A. Sementsov |
| |
| Vol 52, No 1 (2025) |
Architecture of an integrated java application for log analysis to detect computer attacks in information systems by responding to various security anomalies |
Abstract
PDF (Rus)
|
|
P. I. Sharikov, A. V. Krasov, A. V. Mayorovv |
| |
| Vol 52, No 1 (2025) |
Modification of an automatic method for extracting causal relationships based on templates and a Bayesian classifier |
Abstract
PDF (Rus)
|
|
Н. В. Shtanchaev, Z. T. Mugutdinov |
| |
| Vol 52, No 1 (2025) |
Development of a software module for automating the process of calculating water consumption and water disposal using the DYNAMO STUDIO development environment |
Abstract
PDF (Rus)
|
|
T. A. Yurosheva, A. V. Kalinichenko |
| |
| Vol 52, No 1 (2025) |
Ensuring information security in the production network of an industrial enterprise |
Abstract
PDF (Rus)
|
|
A. R. Aydynan, D. G. Kirsanov |
| |
| Vol 52, No 1 (2025) |
Modeling the motion of linear control objects to an external functional trajectory |
Abstract
PDF (Rus)
|
|
V. V. Afonin |
| |
| Vol 52, No 1 (2025) |
On the issue of improving the security systems of critical facilities as objects of critical information infrastructure |
Abstract
PDF (Rus)
|
|
A. A. Gavrishev |
| |
| Vol 52, No 1 (2025) |
Simulation of electromagnetic wave scattering on hollow structures with elliptical cross section |
Abstract
PDF (Rus)
|
|
V. V. Garbuzov, A. P. Preobrazhensky |
| |
| Vol 52, No 1 (2025) |
Prospects for applying bim to create sustainable and energy-efficient buildings in different climatic conditions |
Abstract
PDF (Rus)
|
|
M.N. S. Dewaraja, A. A. Semenov |
| |
| Vol 52, No 1 (2025) |
Mathematical Model for Determining the Degree of Propensity to Be Exposed to Cybercrime |
Abstract
PDF (Rus)
|
|
I. V. Karpasyuk, A. I. Karpasyuk |
| |
| Vol 52, No 1 (2025) |
Assessment of the risks of personal data leakage from through supplier channel attacks |
Abstract
PDF (Rus)
|
|
I. I. Livshits |
| |
| Vol 52, No 1 (2025) |
Estimation of linear regression parameters by minimizing the sum of the excesses of the approximation error modules relative to a given level |
Abstract
PDF (Rus)
|
|
S. I. Noskov, S. V. Belyaev |
| |
| Vol 52, No 1 (2025) |
Estimating the probability of messages delivery in an IoT system |
Abstract
PDF (Rus)
|
|
K. A. Polshchykov, T. N. Mahdi |
| |
| Vol 51, No 4 (2024) |
Russian firewall screening tools for secured systems |
Abstract
PDF (Rus)
|
|
A. M. Sadykov, R. R. Yamaletdinov, D. I. Sabirova |
| |
| Vol 51, No 4 (2024) |
Methods for semantic analysis of the state of the process of functioning of a system for detecting, preventing and eliminating the consequences of computer attacks |
Abstract
PDF (Rus)
|
|
V. O. Shablya, S. A. Konovalenko, E. O. Orlov |
| |
| Vol 51, No 4 (2024) |
Modeling of the processes of functioning of an organizational and technical system based on Markov random processes |
Abstract
PDF (Rus)
|
|
A. O. Zheleznyakov, R. A. Zhilin |
| |
| Vol 51, No 4 (2024) |
Software module for automatic correction of drawings obtained as a result of graphic data exchange between CAD systems, using the furniture production example |
Abstract
PDF (Rus)
|
|
A. V. Kalinichenko, A. Yu. Alikov, T. A. Yurosheva |
| |
| Vol 51, No 4 (2024) |
System analysis and information processing to solve the problem of detecting breakdowns of computer information storage |
Abstract
PDF (Rus)
|
|
N. M. Kodatsky, E. A. Revyakina, A. R. Gazizov |
| |
| Vol 51, No 4 (2024) |
Security indicators for modern electronic document management systems |
Abstract
PDF (Rus)
|
|
I. I. Livshits |
| |
| 1 - 50 of 191 Items |
1 2 3 4 > >>
|