Efficiency comparison of optimum and adaptive methods for multichannel signal filtering A. P. Baranov OriginalPaper 28 January 2016 Pages: 615 - 621
Thermodynamic approach to modeling multi-agent systems in cyberspace D. P. ZegzhdaT. V. Stepanova OriginalPaper 28 January 2016 Pages: 622 - 626
Approach to the construction of the generalized functional-semantic cyber security model P. D. ZegzhdaD. P. ZegzhdaT. V. Stepanova OriginalPaper 28 January 2016 Pages: 627 - 633
Resolving semantic inconsistencies in elibrary.ru based on fuzzy inference A. D. KhomonenkoS. V. VoitsekhovskiiV. L. Dashonok OriginalPaper 28 January 2016 Pages: 634 - 642
Using risk-oriented approaches to solve information security problems P. A. Baranov OriginalPaper 28 January 2016 Pages: 643 - 647
Design and verification of protected systems with integrated devices based on expert knowledge V. A. DesnitskiiI. V. Kotenko OriginalPaper 28 January 2016 Pages: 648 - 652
On using the stochastic superindicator for information security evaluation in automated systems M. A. EremeevI. E. Gorbachev OriginalPaper 28 January 2016 Pages: 653 - 658
Approach to APCS protection from cyber threats D. P. ZegzhdaT. V. Stepanova OriginalPaper 28 January 2016 Pages: 659 - 664
Automatic security management of computer systems P. D. ZegzhdaM. O. Kalinin OriginalPaper 28 January 2016 Pages: 665 - 672
Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters M. O. KalininE. Yu. Pavlenko OriginalPaper 28 January 2016 Pages: 673 - 678
Access control method in distributed grid computing networks A. S. KonoplevM. O. Kalinin OriginalPaper 28 January 2016 Pages: 679 - 683
Secure processor architecture modeling for large-scale systems D. MoskvinD. ZegzhdaA. Nikolskiy OriginalPaper 28 January 2016 Pages: 684 - 689
Support of the integrity of administrative information in intensive data exchange with RDBMS clients M. A. Poltavtseva OriginalPaper 28 January 2016 Pages: 690 - 695
Analytical review of methods of providing internet anonymity I. I. SavchenkoO. Yu. Gatsenko OriginalPaper 28 January 2016 Pages: 696 - 700
Attack tree-based approach for real-time security event processing A. A. ChechulinI. V. Kotenko OriginalPaper 28 January 2016 Pages: 701 - 704
Method of security against computer attacks based on an analysis of executable machine code V. Yu. AranovV. S. Zaborovsky OriginalPaper 28 January 2016 Pages: 705 - 708
Multilevel modeling of preemptive scenarios D. N. BiryukovA. G. LomakoT. R. Sabirov OriginalPaper 28 January 2016 Pages: 709 - 712
Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment N. S. VertA. S. VolkovaM. O. Kalinin OriginalPaper 28 January 2016 Pages: 713 - 720
Universal national security platform for distributed information and telecommunication systems A. S. Konoplev OriginalPaper 28 January 2016 Pages: 721 - 726
Adaptive reflexivity threat protection D. S. LavrovaA. I. Pechenkin OriginalPaper 28 January 2016 Pages: 727 - 734
Applying correlation analysis methods to control flow violation detection in the internet of things D. LavrovaA. PechenkinV. Gluhov OriginalPaper 28 January 2016 Pages: 735 - 740
Model of hidden IT security threats in the cloud computing environment A. S. MolyakovV. S. ZaborovskyA. A. Lukashin OriginalPaper 28 January 2016 Pages: 741 - 744
Methods of protecting self-organizing networks against attacks on traffic routing D. A. MoskvinD. V. Ivanov OriginalPaper 28 January 2016 Pages: 745 - 750
Formal model of cyber attacks on virtualization tools and a measure of hypervisor vulnerability A. V. NikolskiyYu. S. Vasil’ev OriginalPaper 28 January 2016 Pages: 751 - 757
Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster A. I. PechenkinA. V. Nikolskiy OriginalPaper 28 January 2016 Pages: 758 - 765
Using data-mining methods to detect network attacks V. V. PlatonovP. O. Semenov OriginalPaper 28 January 2016 Pages: 766 - 769
Organization of revocation for lattice-based group signature scheme E. B. AleksandrovaE. A. Kuznetsova OriginalPaper 28 January 2016 Pages: 770 - 777
Using adaptive filtering of signals for estimation of the Mahalanobis distance A. P. Baranov OriginalPaper 28 January 2016 Pages: 778 - 784
Study of countermeasures against covert channels in IP networks A. V. EpishkinaK. G. Kogos OriginalPaper 28 January 2016 Pages: 785 - 789
Analysis of broadcast schemes that implement identity-based encryption algorithms A. N. KulakovE. B. Aleksandrova OriginalPaper 28 January 2016 Pages: 790 - 797
Ideal composite modular secret sharing schemes N. N. Shenets OriginalPaper 28 January 2016 Pages: 798 - 802
User authentication based on the chess graphical password scheme resistant to shoulder surfing V. A. YakovlevV. V. Arkhipov OriginalPaper 28 January 2016 Pages: 803 - 812
Mechanism of establishing authorship of short messages posted by users of internet portals by methods of mathematical linguistics M. E. Sukhoparov OriginalPaper 28 January 2016 Pages: 813 - 819
Detection of anomalies in behavior of the software with usage of Markov chains P. D. ZegzhdaS. S. KortA. F. Suprun OriginalPaper 28 January 2016 Pages: 820 - 825
Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols A. I. PechenkinD. S. Lavrova OriginalPaper 28 January 2016 Pages: 826 - 833
The use of virtualization technology in the dynamic analysis of software code A. Yu. ChernovA. S. Konoplev OriginalPaper 28 January 2016 Pages: 834 - 837