MainCatalogInformatics, Computer Engineering and ControlMethods and Systems of Information Protection, Information Security
Modeling of Information Security Threats of Onboard Aircraft Computing Facilities
Authors: Glinskaya E.V., Chichvarin N.V. | Published: 06.12.2016 |
Published in issue: #6(111)/2016 | |
DOI: 10.18698/0236-3933-2016-6-85-96 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: avionics, automated systems, security, computer systems, information, modular platform |
The main directions of expanding the insider information security model
Authors: Sychev V.M. | Published: 08.04.2016 |
Published in issue: #2(107)/2016 | |
DOI: 10.18698/0236-3933-2016-2-125-137 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, insider, intruder model, temporality, classification, data mining |
Heuristic analysis of source code security
Authors: Markov A.S. , Matveev V.A. , Fadin A.A., Tsirlov V.L. | Published: 19.02.2016 |
Published in issue: #1(106)/2016 | |
DOI: 10.18698/0236-3933-2016-1-98-111 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, software security, testing, static analysis, production models, heuristic analysis, vulnerabilities, defects, undeclared capabilities |
Thе prime formation model based on the symmetric representation of ring factorization in selecting composite numbers
Authors: Minaev V.A., Vayts E.V., Nikerov D.V., Nikonov S.A. | Published: 19.02.2016 |
Published in issue: #1(106)/2016 | |
DOI: 10.18698/0236-3933-2016-1-89-97 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, primes, ring factorization |
One-dimentional statistical characteristics of binary random phase mask in the far-field diffraction pattern
Authors: Kolesnikov M.V., Trofimov N.E. | Published: 12.10.2015 |
Published in issue: #5(104)/2015 | |
DOI: 10.18698/0236-3933-2015-5-97-108 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: binary random phase masks, optical Fourier transform, probability density, complex amplitude, random field |
Assessing the security risk of attacks DoS-routing functions of the signaling system SS7 in the GSM network
Authors: Matveev V.A. , Bel’fer R.A., Glinskaya E.V. | Published: 03.09.2015 |
Published in issue: #4(103)/2015 | |
DOI: 10.18698/0236-3933-2015-4-127-138 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: common channel signaling No. 7, CCS7, message transfer part, MTP signaling connection control part, SCCP, GSM, threat, denial of service, DoS, signaling point, signal point |
Formalization of Information Security Insider Model
Authors: Sychev V.M. | Published: 14.04.2015 |
Published in issue: #2(101)/2015 | |
DOI: 10.18698/0236-3933-2015-2-92-106 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: insider model, threat level quantitative assessment, rating method |
Analysis of Information Security Threats for Virtual Private Networks VPLS Based on Network MPLS
Authors: Bel’fer R.A., Petrukhin I.S., Tepikin A.P. | Published: 08.02.2015 |
Published in issue: #1(100)/2015 | |
DOI: 10.18698/0236-3933-2015-1-47-57 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: virtual private network (VPN), information security, virtual private local area network (VlAN) service (VPLS), multiple protocol label switching (MPLS), customer edge router (CE), provider edge router (PE), pseudowire (PW), provider router |