Management of information security risks in a context of uncertainty I. M. AzhmukhamedovO. N. VybornovaYu. M. Brumshtein OriginalPaper 08 February 2017 Pages: 657 - 663
Access control system for distributed computing networks A. S. KonoplevM. O. Kalinin OriginalPaper 08 February 2017 Pages: 664 - 668
Tasks of providing information security in distributed computing networks A. S. KonoplevM. O. Kalinin OriginalPaper 08 February 2017 Pages: 669 - 672
An approach to developing the SIEM system for the Internet of Things D. S. Lavrova OriginalPaper 08 February 2017 Pages: 673 - 681
A prototype computer with non-von Neumann architecture based on strategic domestic J7 microprocessor A. S. Molyakov OriginalPaper 08 February 2017 Pages: 682 - 686
Token scanning as a new scientific approach in the creation of protected systems: A new generation OS MICROTEK A. S. Molyakov OriginalPaper 08 February 2017 Pages: 687 - 692
Development of automated system for identifying abnormal network activity and detecting threats V. V. NikonovV. P. Los’G. V. Ross OriginalPaper 08 February 2017 Pages: 693 - 702
Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster M. A. PoltavtsevaD. S. LavrovaA. I. Pechenkin OriginalPaper 08 February 2017 Pages: 703 - 711
Information security of data channels based on a multifunctional tailored software and hardware solution M. E. SukhoparovI. S. LebedevI. E. Krivtsova OriginalPaper 08 February 2017 Pages: 712 - 716
A risk-oriented approach to the control arrangement of security protection subsystems of information systems V. G. AnisimovP. D. ZegzhdaD. A. Bazhin OriginalPaper 08 February 2017 Pages: 717 - 721
Intelligent data analysis in information security A. A. GrushoN. A. GrushoE. E. Timonina OriginalPaper 08 February 2017 Pages: 722 - 725
Detection of anomalous behavior in a robot system based on deep learning elements L. V. UtkinV. S. ZaborovskiiS. G. Popov OriginalPaper 08 February 2017 Pages: 726 - 733
Technology of security services virtualization for high-speed computer networks P. D. ZegzhdaM. O. Kalinin OriginalPaper 08 February 2017 Pages: 734 - 738
Applying the group signature for entity authentication in distributed grid computing networks E. B. AleksandrovaD. P. ZegzhdaA. S. Konoplev OriginalPaper 08 February 2017 Pages: 739 - 742
Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates A. G. BusyginA. S. KonoplevM. O. Kalinin OriginalPaper 08 February 2017 Pages: 743 - 748
Attainable upper estimate of the degree of distinguishability of a connected permutation automaton A. V. Babash OriginalPaper 08 February 2017 Pages: 749 - 758
Asymptotic assessments of CRC error probabilities in some telecommunication protocols A. P. BaranovP. A. Baranov OriginalPaper 08 February 2017 Pages: 759 - 764
Assessment of CRC error probability at minor distortion of information A. P. BaranovP. A. Baranov OriginalPaper 08 February 2017 Pages: 765 - 772
KDP scheme of preliminary key distribution in discretionary security policy S. V. BelimS. Yu. Belim OriginalPaper 08 February 2017 Pages: 773 - 776
Distribution of cryptographic keys in systems with a hierarchy of objects S. V. BelimN. F. Bogachenko OriginalPaper 08 February 2017 Pages: 777 - 786
User identification and authentication system based on a hybrid fuzzy approach K. S. SumkinV. P. Los’G. V. Ross OriginalPaper 08 February 2017 Pages: 787 - 791
Implementation of symmetric encryption by State Standard 28147–89 algorithm on a graphical processor M. E. SukhoparovI. S. Lebedev OriginalPaper 08 February 2017 Pages: 792 - 795
Tripartite outsoursing key-agreement protocol on bilinear pairings E. B. AleksandrovaE. N. Shkorkina OriginalPaper 08 February 2017 Pages: 796 - 801
A text steganography method based on Markov chains A. N. ShniperovK. A. Nikitina OriginalPaper 08 February 2017 Pages: 802 - 808
Multiagent system controllability evaluation using the multilevel structure of the graph of agents D. P. ZegzhdaT. V. StepanovaA. F. Suprun OriginalPaper 08 February 2017 Pages: 809 - 812
Sustainability as a criterion for information security in cyber-physical systems D. P. Zegzhda OriginalPaper 08 February 2017 Pages: 813 - 819