Preview

Herald of Dagestan State Technical University. Technical Sciences

Advanced search

Section Details


INFORMATION TECHNOLOGY AND TELECOMMUNICATIONS

 
Issue Title
 
Vol 52, No 3 (2025) Methodology for selecting effectiveness criteria of information Security Systems during Red Team simulated attacks Abstract   PDF (Rus)
S. A. Reznichenko, D. R. Turabov
 
Vol 52, No 3 (2025) Development of an interface for calculating the non-sinusoidal coefficient with adaptive window Fourier transform and the power part of the active filter in the high-voltage network of a mining and processing plant Abstract   PDF (Rus)
G. A. Falkov
 
Vol 52, No 3 (2025) Finite Element method application for Assessing the performance of pipelines with Geometrical defects Abstract   PDF (Rus)
R. A. Khuramshina, D. A. Gaizullin
 
Vol 52, No 3 (2025) Optimization of the layout of construction objects in space by the generative design method using the DYNAMO STUDIO development environment Abstract   PDF (Rus)
T. A. Yurosheva
 
Vol 52, No 3 (2025) Basic approaches to assessing the Security of Information Systems and prospects for their application in the internal affairs agencies of the Russian Federation Abstract   PDF (Rus)
A. I. Yangirov, A. S. Cherkasova, A. O. Efimov, E. A. Rogozin, S. B. Akhlyustin
 
Vol 52, No 3 (2025) Organizational and technical systems – work analysis and research methodology Abstract   PDF (Rus)
A. V. Melnikov, A. O. Zheleznyakov, R. A. Zhilin
 
Vol 52, No 3 (2025) Optimization of PI controller tuning in automatic control systems for complex technological processes at Nuclear Power Plants Abstract   PDF (Rus)
D. S. Meniuk
 
Vol 52, No 3 (2025) Organization and methodology of an experiment to determine initial data for assessing software security indicators for automated systems of internal affairs agencies Abstract   PDF (Rus)
A. D. Popova, I. G. Drovnikova, A. D. Popov
 
Vol 52, No 3 (2025) Slowloris DDoS Defense Mechanism Abstract   PDF (Rus)
P. V. Razumov, L. V. Cherkesova, E. A. Revyakina
 
Vol 52, No 3 (2025) Monte Carlo simulation of reliability of electronic components of very large-scale integrated circuits Abstract   PDF (Rus)
T. I. Isabekova, S. E. Savzikhanova
 
Vol 52, No 3 (2025) Automating the Process of Assessing the Technical Condition of Exterior Walls of Brick Buildings Using Machine Learning Abstract   PDF (Rus)
S. A. Krylov, G. G. Kashevarova
 
Vol 52, No 3 (2025) On the issue of ensuring information Security requirements at the University Abstract   PDF (Rus)
I. I. Livshits
 
Vol 52, No 3 (2025) Application of a Genetic algorithm for the rational placement of Rectangular items Abstract   PDF (Rus)
M. V. Mairamty
 
Vol 52, No 3 (2025) Algorithms for Modules Implementing Amplitude Impulse Modulation Abstract   PDF (Rus)
N. L. Grechkin, E. Yu. Vataeva
 
Vol 52, No 3 (2025) Modification of the Random Forest Algorithm for Selecting Investment Instruments Abstract   PDF (Rus)
A. V. Zinenko
 
Vol 52, No 3 (2025) Asymmetric S-curves for predicting the dynamics of new technology diffusion Abstract   PDF (Rus)
A. V. Mandrik, A. S. Glukhanov
 
Vol 52, No 2 (2025) A method of processing expert data for constructing empirical mathematical models of complex systems operating in unstable environments Abstract   PDF (Rus)
N. L. Balamirzoev, V. B. Melekhin
 
Vol 52, No 2 (2025) Information security incident management and analysis service Abstract   PDF (Rus)
O. Yu. Basharina, E. V. Butsenko, A. S. Eremeev
 
Vol 52, No 2 (2025) A hybrid method for modeling artificial intelligence systems to detect cyberattacks Abstract   PDF (Rus)
A. I. Dubrovina
 
Vol 52, No 2 (2025) A new method for determining the characteristics of block algorithms Abstract   PDF (Rus)
V. A. Egunov
 
Vol 52, No 2 (2025) Causes, classification, and criticality of information system software vulnerabilities Abstract   PDF (Rus)
A. O. Efimov
 
Vol 52, No 2 (2025) Security threat protection strategies: development of a cybersecurity system Abstract   PDF (Rus)
G. I. Kachaeva, N. G. Sultanov
 
Vol 52, No 2 (2025) Combination of systems for recognition and tracking of anomalous objects in telecommunication systems Abstract   PDF (Rus)
D. A. Kryukova, S. D. Shibaikin, V. V. Nikulin, S. R. Baibikova, N. O. Surkov, V. Yu. Kozyaykin
 
Vol 52, No 2 (2025) Protection of commercial information flows in an industrial enterprise Abstract   PDF (Rus)
I. A. Loskutov, S. E. Akatov
 
Vol 52, No 2 (2025) Practical recommendations for assessing software security and choosing its optimal version for use at facilities of informatization of internal affairs agencies Abstract   PDF (Rus)
A. D. Popova, I. G. Drovnikova
 
Vol 52, No 2 (2025) Protection mechanism against ddos attack intended to block account Abstract   PDF (Rus)
P. V. Razumov, L. V. Cherkesova, E. A. Revyakina, A. A. Klevtsov
 
Vol 52, No 2 (2025) Methodology of load testing of firewalling tools Abstract   PDF (Rus)
A. M. Sadykov, R. R. Yamaletdinov
 
Vol 52, No 2 (2025) Intelligent analysis of smoke formation processes in fires: new approaches based on AI technologies Abstract   PDF (Rus)
M. V. Shevtsov, A. N. Denisov, M. V. Ivanov, A. A. Kozlov
 
Vol 52, No 2 (2025) Mathematical model for quantitative assessment of the Security of open operating systems when selecting in the AS of the Internal Affairs Bodies Abstract   PDF (Rus)
A. I. Yangirov, E. A. Rogozin, P. M. Duplyakin, T. V. Meshcheryakova, A. O. Efimov
 
Vol 52, No 1 (2025) Influence of the human-machine-environment system on reliability automated systems IAB of the Russian Federation Abstract   PDF (Rus)
A. I. Yangirov, I. M. Yangirov, I. G. Drovnikova, V. R. Romanova, P. M. Duplyakin
 
Vol 52, No 1 (2025) Comparative analysis of frameworks for mobile application development: native, hybrid or cross-platform solutions Abstract   PDF (Rus)
A. B. Temirova
 
Vol 52, No 1 (2025) Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification Abstract   PDF (Rus)
L. V. Cherkesova, V. A. Savelyev, E. A. Revyakina, A. R. Polulyakh, M. A. Sementsov
 
Vol 52, No 1 (2025) Architecture of an integrated java application for log analysis to detect computer attacks in information systems by responding to various security anomalies Abstract   PDF (Rus)
P. I. Sharikov, A. V. Krasov, A. V. Mayorovv
 
Vol 52, No 1 (2025) Modification of an automatic method for extracting causal relationships based on templates and a Bayesian classifier Abstract   PDF (Rus)
Н. В. Shtanchaev, Z. T. Mugutdinov
 
Vol 52, No 1 (2025) Development of a software module for automating the process of calculating water consumption and water disposal using the DYNAMO STUDIO development environment Abstract   PDF (Rus)
T. A. Yurosheva, A. V. Kalinichenko
 
Vol 52, No 1 (2025) Ensuring information security in the production network of an industrial enterprise Abstract   PDF (Rus)
A. R. Aydynan, D. G. Kirsanov
 
Vol 52, No 1 (2025) Modeling the motion of linear control objects to an external functional trajectory Abstract   PDF (Rus)
V. V. Afonin
 
Vol 52, No 1 (2025) On the issue of improving the security systems of critical facilities as objects of critical information infrastructure Abstract   PDF (Rus)
A. A. Gavrishev
 
Vol 52, No 1 (2025) Simulation of electromagnetic wave scattering on hollow structures with elliptical cross section Abstract   PDF (Rus)
V. V. Garbuzov, A. P. Preobrazhensky
 
Vol 52, No 1 (2025) Prospects for applying bim to create sustainable and energy-efficient buildings in different climatic conditions Abstract   PDF (Rus)
M.N. S. Dewaraja, A. A. Semenov
 
Vol 52, No 1 (2025) Mathematical Model for Determining the Degree of Propensity to Be Exposed to Cybercrime Abstract   PDF (Rus)
I. V. Karpasyuk, A. I. Karpasyuk
 
Vol 52, No 1 (2025) Assessment of the risks of personal data leakage from through supplier channel attacks Abstract   PDF (Rus)
I. I. Livshits
 
Vol 52, No 1 (2025) Estimation of linear regression parameters by minimizing the sum of the excesses of the approximation error modules relative to a given level Abstract   PDF (Rus)
S. I. Noskov, S. V. Belyaev
 
Vol 52, No 1 (2025) Estimating the probability of messages delivery in an IoT system Abstract   PDF (Rus)
K. A. Polshchykov, T. N. Mahdi
 
Vol 51, No 4 (2024) Russian firewall screening tools for secured systems Abstract   PDF (Rus)
A. M. Sadykov, R. R. Yamaletdinov, D. I. Sabirova
 
Vol 51, No 4 (2024) Methods for semantic analysis of the state of the process of functioning of a system for detecting, preventing and eliminating the consequences of computer attacks Abstract   PDF (Rus)
V. O. Shablya, S. A. Konovalenko, E. O. Orlov
 
Vol 51, No 4 (2024) Modeling of the processes of functioning of an organizational and technical system based on Markov random processes Abstract   PDF (Rus)
A. O. Zheleznyakov, R. A. Zhilin
 
Vol 51, No 4 (2024) Software module for automatic correction of drawings obtained as a result of graphic data exchange between CAD systems, using the furniture production example Abstract   PDF (Rus)
A. V. Kalinichenko, A. Yu. Alikov, T. A. Yurosheva
 
Vol 51, No 4 (2024) System analysis and information processing to solve the problem of detecting breakdowns of computer information storage Abstract   PDF (Rus)
N. M. Kodatsky, E. A. Revyakina, A. R. Gazizov
 
Vol 51, No 4 (2024) Security indicators for modern electronic document management systems Abstract   PDF (Rus)
I. I. Livshits
 
1 - 50 of 191 Items 1 2 3 4 > >>