ФГУП “НТЦ оборонного комплекса “Компас”
РУС
|
ENG
Forgot your password?
Enter
Register
Login As
You can log in if you are registered at one of these services:
Livejournal
Yandex
Mail.Ru
Liveinternet
Blogger
OpenID
.livejournal.com
@yandex.ru
@mail.ru
liveinternet.ru/users/
.blogspot.com
OpenID:
NEWS
SITE MAP
CONTACTS
SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”
About journal
Journal policy
Journal themes
Journal ethics
Journal history
Our authors
Editorial Board
Contacts
For readers
Private office
Search
Archive issues
Articles search according to sections
For authors
Private office
Journal sections
Right direction, review and publication scientific articles
Order of articles peer reviewing
Order of articles consideration
Subscription
FAQ
Statistics
Help Users
Helpful references
Main
Editions
“Information security questions” (ISQ) ("Voprosy zaŝity informacii")
For readers
Contents of issue
Statistics
To obtain access to full text of journal and articles you must register!
2013 / 4
№
Price
Author
Article's name
1
0.00 rub
Studennikov K. O.
Lopin V. N.
About information systems risk modeling based on bayesian networks
2
0.00 rub
Kuznetcov A. V.
Method of developing access rights profiles and system privileges of internal adversaries
3
0.00 rub
Shcheglov K. A.
Shcheglov A. Yu.
Implementation of mandatory access control to newly created file objects method
4
0.00 rub
Komashinskiy D. V.
Kotenko I. V.
Data mining methods for malware detection: review of state-of-the-art
5
0.00 rub
Kuzmin V. V.
Semashko A. V.
Belova Yu. V.
Management system of telecommunication services in a telecoms operators network
6
0.00 rub
Kulikov G. V.
Nepomnyashchikh A. V.
Sosnin Yu. V.
Nashchekin P. A.
Features technology dynamic protection of information resources of automated control systems
7
0.00 rub
Semenov A. V.
Kostyuck A. V.
Providing information security for state-of-the-art foreign FPGA used in a special equipment
8
0.00 rub
Nashchekin P. A.
Nepomnyashchikh A. V.
Sosnin Yu. V.
Kulikov G. V.
Criteria and methods of verification of the fulfillment of requirements for an automated system security settings are changed or allocated resources of information security
9
0.00 rub
Prokhorov R. S.
Methods of behavioristic process recognition in operating system Windows 7
10
0.00 rub
Golchevsky Yu. V.
Severin P. A.
Dynamics of common content management systems vulnerability detection analysis
11
0.00 rub
Hodashinsky I. A.
Mescheriakov R. V.
Rubanov S. A.
The construction of fuzzy intrusion detection classifiers based greedy and genetic algorithms
90
ISSUES
953
ARTICLES
2324
DOWNLOADS
Section has not been found.
CM
IE
ITDP
DIARSTP
ISQ
IIS
AP