|
Issue |
Title |
|
Vol 52, No 1 (2025) |
Comparative analysis of frameworks for mobile application development: native, hybrid or cross-platform solutions |
Abstract
PDF (Rus)
|
A. B. Temirova |
|
Vol 52, No 1 (2025) |
Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification |
Abstract
PDF (Rus)
|
L. V. Cherkesova, V. A. Savelyev, E. A. Revyakina, A. R. Polulyakh, M. A. Sementsov |
|
Vol 52, No 1 (2025) |
Architecture of an integrated java application for log analysis to detect computer attacks in information systems by responding to various security anomalies |
Abstract
PDF (Rus)
|
P. I. Sharikov, A. V. Krasov, A. V. Mayorovv |
|
Vol 52, No 1 (2025) |
Modification of an automatic method for extracting causal relationships based on templates and a Bayesian classifier |
Abstract
PDF (Rus)
|
Н. В. Shtanchaev, Z. T. Mugutdinov |
|
Vol 52, No 1 (2025) |
Development of a software module for automating the process of calculating water consumption and water disposal using the DYNAMO STUDIO development environment |
Abstract
PDF (Rus)
|
T. A. Yurosheva, A. V. Kalinichenko |
|
Vol 52, No 1 (2025) |
Influence of the human-machine-environment system on reliability automated systems IAB of the Russian Federation |
Abstract
PDF (Rus)
|
A. I. Yangirov, I. M. Yangirov, I. G. Drovnikova, V. R. Romanova, P. M. Duplyakin |
|
Vol 52, No 1 (2025) |
Ensuring information security in the production network of an industrial enterprise |
Abstract
PDF (Rus)
|
A. R. Aydynan, D. G. Kirsanov |
|
Vol 52, No 1 (2025) |
Modeling the motion of linear control objects to an external functional trajectory |
Abstract
PDF (Rus)
|
V. V. Afonin |
|
Vol 52, No 1 (2025) |
On the issue of improving the security systems of critical facilities as objects of critical information infrastructure |
Abstract
PDF (Rus)
|
A. A. Gavrishev |
|
Vol 52, No 1 (2025) |
Simulation of electromagnetic wave scattering on hollow structures with elliptical cross section |
Abstract
PDF (Rus)
|
V. V. Garbuzov, A. P. Preobrazhensky |
|
Vol 52, No 1 (2025) |
Prospects for applying bim to create sustainable and energy-efficient buildings in different climatic conditions |
Abstract
PDF (Rus)
|
M.N. S. Dewaraja, A. A. Semenov |
|
Vol 52, No 1 (2025) |
Mathematical Model for Determining the Degree of Propensity to Be Exposed to Cybercrime |
Abstract
PDF (Rus)
|
I. V. Karpasyuk, A. I. Karpasyuk |
|
Vol 52, No 1 (2025) |
Assessment of the risks of personal data leakage from through supplier channel attacks |
Abstract
PDF (Rus)
|
I. I. Livshits |
|
Vol 52, No 1 (2025) |
Estimation of linear regression parameters by minimizing the sum of the excesses of the approximation error modules relative to a given level |
Abstract
PDF (Rus)
|
S. I. Noskov, S. V. Belyaev |
|
Vol 52, No 1 (2025) |
Estimating the probability of messages delivery in an IoT system |
Abstract
PDF (Rus)
|
K. A. Polshchykov, T. N. Mahdi |
|
Vol 51, No 4 (2024) |
Security indicators for modern electronic document management systems |
Abstract
PDF (Rus)
|
I. I. Livshits |
|
Vol 51, No 4 (2024) |
On the hypothesis of the equation for technical system state |
Abstract
PDF (Rus)
|
D. J. Lobach |
|
Vol 51, No 4 (2024) |
On methods of setting the coordinates of the mouse pointer in the case of alternative options for constructing human-computer interaction |
Abstract
PDF (Rus)
|
P. V. Peresunko |
|
Vol 51, No 4 (2024) |
Algorithm for determining the degree of vulnerability of cloud computing areas based on the electre i method |
Abstract
PDF (Rus)
|
S. V. Razumnikov |
|
Vol 51, No 4 (2024) |
Adaptation of the competence approach to the methodology of training it specialists in the field of programming |
Abstract
PDF (Rus)
|
E. V. Savina, K. Ya. Radjabov, T. I. Isabekova |
|
Vol 51, No 4 (2024) |
Russian firewall screening tools for secured systems |
Abstract
PDF (Rus)
|
A. M. Sadykov, R. R. Yamaletdinov, D. I. Sabirova |
|
Vol 51, No 4 (2024) |
Methods for semantic analysis of the state of the process of functioning of a system for detecting, preventing and eliminating the consequences of computer attacks |
Abstract
PDF (Rus)
|
V. O. Shablya, S. A. Konovalenko, E. O. Orlov |
|
Vol 51, No 4 (2024) |
Modeling of the processes of functioning of an organizational and technical system based on Markov random processes |
Abstract
PDF (Rus)
|
A. O. Zheleznyakov, R. A. Zhilin |
|
Vol 51, No 4 (2024) |
Software module for automatic correction of drawings obtained as a result of graphic data exchange between CAD systems, using the furniture production example |
Abstract
PDF (Rus)
|
A. V. Kalinichenko, A. Yu. Alikov, T. A. Yurosheva |
|
Vol 51, No 4 (2024) |
System analysis and information processing to solve the problem of detecting breakdowns of computer information storage |
Abstract
PDF (Rus)
|
N. M. Kodatsky, E. A. Revyakina, A. R. Gazizov |
|
Vol 51, No 4 (2024) |
An analytical assessment of credit card fraud detection techniques: Supervised, Unsupervised, and Reinforcement Learning |
Abstract
PDF (Rus)
|
Abdourahman Djamal Djama |
|
Vol 51, No 4 (2024) |
Analysis of existing mathematical models for assessing the competencies of higher education students |
Abstract
PDF (Rus)
|
J. A. Bychkovskaya, V. S. Bychkovsky |
|
Vol 51, No 4 (2024) |
On assessing the sustainability of functioning of microparametric cyber risk insurance facilities |
Abstract
PDF (Rus)
|
V. A. Voevodin |
|
Vol 51, No 4 (2024) |
Modeling of turbulent fluid flow based on the solution of the Mathieu equation |
Abstract
PDF (Rus)
|
V. V. Garbuzov, A. P. Preobrazhensky |
|
Vol 51, No 4 (2024) |
The model of automation of university management processes |
Abstract
PDF (Rus)
|
M. I. Grachev |
|
Vol 51, No 3 (2024) |
Quality of tracking methods with object reidentification |
Abstract
PDF (Rus)
|
N. A. Maltceva, A. A. Polozov, N. V. Papulovskaya, S. L. Goldshtein |
|
Vol 51, No 3 (2024) |
Research of ways to improve the security of corporate networks |
Abstract
PDF (Rus)
|
N. F. Makhmutova, E. V. Birikh, D. V. Sakharov, A. S. Krivets, M. A. Degtyarev |
|
Vol 51, No 3 (2024) |
Combined application of methods of maximum consistency and anti-robust parameter estimation in the construction of regression models |
Abstract
PDF (Rus)
|
S. I. Noskov, Yu. A. Bychkov |
|
Vol 51, No 3 (2024) |
Web service with machine learning model for airspace monitoring |
Abstract
PDF (Rus)
|
A. D. Popov |
|
Vol 51, No 3 (2024) |
Research by the method of an extended systematical literature review E-SLR the problem of ensuring the security of personal data when using OSINT |
Abstract
PDF (Rus)
|
N. N. Romanova, V. V. Gryzunov |
|
Vol 51, No 3 (2024) |
Analysis of the main approaches to modeling management processes for special-purpose organizational and technical systems |
Abstract
PDF (Rus)
|
A. F. Salnikov, K. V. Ivanova, N. A. Merkulova |
|
Vol 51, No 3 (2024) |
Detection of phishing portals through machine learning algorithms |
Abstract
PDF (Rus)
|
E. A. Trushnikov |
|
Vol 51, No 3 (2024) |
Methodological approach to quantitative assessment of the security of open operating systems AS of the Internal Affairs Bodies |
Abstract
PDF (Rus)
|
A. I. Yangirov, I. M. Yangirov, E. A. Rogozin, S. B. Akhlyustin |
|
Vol 51, No 3 (2024) |
Research of methods of modeling of mass service enterprise |
Abstract
PDF (Rus)
|
Sh. M. Jafarova, S. M. Akhmedova, A. G. Aliyeva |
|
Vol 51, No 3 (2024) |
Data caching technologies in modern microprocessors |
Abstract
PDF (Rus)
|
V. A. Egunov, V. A. Shabalovsky |
|
Vol 51, No 3 (2024) |
Methodology for detecting anomalies in cyber attack assessment data using Random Forest and Gradient Boosting in machine learning |
Abstract
PDF (Rus)
|
A. S. Kechedzhiev, O. L. Tsvetkova, A. I. Dubrovina |
|
Vol 51, No 3 (2024) |
Finding the optimal way to build an information security system based on Markov chains |
Abstract
PDF (Rus)
|
A. M. Konakov, I. I. Livshits |
|
Vol 51, No 3 (2024) |
Structural organization of a fuzzy system for monitoring the condition of equipment and control of a gas distribution station |
Abstract
PDF (Rus)
|
A. I. Magomedov, I. A. Magomedov, M. Sh. Usmanov |
|
Vol 51, No 3 (2024) |
Categorization of objects of critical information infrastructure of higher education institutions |
Abstract
PDF (Rus)
|
E. V. Burkova, A. A. Rychkova, L. A. Gritsenko |
|
Vol 51, No 2 (2024) |
Architecture of the Information Security Incident Management System at Oil and Gas Enterprises |
Abstract
PDF (Rus)
|
O. L. Tsvetkova, A. R. Aidinyan |
|
Vol 51, No 2 (2024) |
Development of models for classifying the movements of an anthropomorphic body from a video stream |
Abstract
PDF (Rus)
|
M. V. Tereshchuk, A. V. Zubkov, Yu. A. Orlova, D. R. Molchanov, V. A. Litvinenko, D. R. Cherkashin |
|
Vol 51, No 2 (2024) |
Voice authentication module using mel-cepstral coefficients |
Abstract
PDF (Rus)
|
D. A. Elizarov, P. A. Ashaeva, E. A. Stepanova |
|
Vol 51, No 2 (2024) |
The use of dynamic modeling methods to create an adaptive training system for specialists that meets modern demands in the information field |
Abstract
PDF (Rus)
|
A. M. Konakov, I. I. Livshits |
|
Vol 51, No 2 (2024) |
On some problems of analysis and assessment of the influence of the human factor on the safety of technical systems |
Abstract
PDF (Rus)
|
D. I. Lobach |
|
Vol 51, No 2 (2024) |
Development of a model for improving an automated information system based on flexible reengineering |
Abstract
PDF (Rus)
|
S. G. Menyuk, V. V. Dyadichev, G. R. Bilenko |
|
1 - 50 of 162 Items |
1 2 3 4 > >>
|