ФГУП “НТЦ оборонного комплекса “Компас”

РУС | ENG 

SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”



To obtain access to full text of journal and articles you must register!



2019 / 1

Price Author Article's name
1
500.00 rub

Zhvachkin Ya. A.

Development of process isolation method for creating an isolated software environment in Windows 10
2
500.00 rub

Erin F. M.

Mechanisms for creating and using a configuration standard of virtual infrastructure for integrity control
3
500.00 rub

Markov I. V.

Choice tool of remote service integrity control systems
4
500.00 rub

Bondarenko Ya. I.

Mozolina N. V.

Development of remote management system for trusted boot modules
5
500.00 rub

Konyavsky V. A.

Protected computers of new harvard architecture
6
500.00 rub

Konyavsky V. A.

Ross G. V.

Singaevckiy S. N.

Identification/authentication of a "Digital citizen" in an unknowned environment
7
500.00 rub

Sulavko A. E.

Shalina E. V.

Stadnikov D. G.

Choban A. G.

Immune algorithms for pattern recognition and their application in biometric systems (Review)
8
500.00 rub

Goncharenko G. Yu.

Yermolatiy D. A.

Pitelinsky K. V.

About some measures and tools for securing the home server
9
500.00 rub

Bochkarev E. G.

Zabolotnyy I. V.

Gulevskiy I. V.

Golobоkov V. A.

Kovats G.

Sopronyi R.

Koltai K.

Maklari T.

Maleev V. V.

Data protection in infocommunication network for monitoring and management of epidemic situation, prevention of emergency situations
10
500.00 rub

Vasilets V. I.

Skvortsov V. E.

Information and methodological support for the operation of the information protection system of a categorized industrial facility
11
500.00 rub

Moskvitin G. I.

The general approach to a decision making in the system of information security under indistinct initial conditions
12
500.00 rub

Kovalenko Yu. I.

About approaches on application of methods of prediction of development military management decision
13
500.00 rub

Taraskin M. M.

Features of application of the Delfi method at assessment of information risks in the system of information security