Structural modeling of threats to information security of computer-aided design systems
Authors: Volosatova T.M., Chichvarin I.N. | Published: 12.09.2013 |
Published in issue: #3(92)/2013 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: threat models, information security of CAD system, threat of unauthorized access, false data vector, data leakage vector, probabilistic automation, fuzzy automation, non-deterministic automation, deterministic automation, composition of automata |
Geometrical resolvability of three-dimensional scenes
Authors: Bozhko A.N. | Published: 13.09.2013 |
Published in issue: #3(92)/2013 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: three-dimensional scene, assembling, deformation retract, ordered set, geometrical access, geometrical resolvability |
Standards and Policy of Information Security of Automated Systems
Authors: Medvedev N.V., Kvasov P.M., Tsirlov V.L. | Published: 28.10.2013 |
Published in issue: #1(78)/2010 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: policy ofinformation security, automated system, safety threats, information security model, information risks, risk model |
Description of Dynamics of Computer Threats Propagation in Data Computer Networks with Delay of Antivirus Software Operation
Authors: Gusarov A.N., Zhukov D.O., Kosareva A.V. | Published: 28.10.2013 |
Published in issue: #1(78)/2010 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: data computer network, computer threats, viruses, antiviruses |
Integral Estimation of Resource States of User Route in Corporate Network
Authors: Ivanov I.P. | Published: 31.10.2013 |
Published in issue: #2(79)/2010 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: network, host, loading, traffic, resource, interface |
Electronic University System and its Role in Maintenance of Educational Process in the Bauman Moscow State Technical University
Authors: Moskalenko V.O., Tarapanova Ye.A., Yudin Ye.G. | Published: 31.10.2013 |
Published in issue: #2(79)/2010 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: Electronic University System, educational process, database, management systems, efficiency of teaching |
Availability of Resources of Transport Subsystems of Corporative Networks
Authors: BoychenkoM.K., Ivanov I.P., Kondratiev A.Yu. | Published: 03.11.2013 |
Published in issue: #3(80)/2010 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: network, transport subsystem, host, traffic, resource, interface, blocking |
Model of Transaction Processing in Database Parallel System
Authors: Grigoriev Yu.A., Pluzhnikov V.L. | Published: 03.11.2013 |
Published in issue: #4(81)/2010 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: parallel database, Laplace-Stieltjes transform, expectance of transaction time |
Procedure of Optimal Database Set-up by Example of ANALITIK System
Authors: Lachikhina A.B., Mazin A.V. | Published: 03.11.2013 |
Published in issue: #4(81)/2010 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: monitoring, database set-up, throughput, integrity, transaction, automatic acquisition of diagnostic data |
Life Cycle Models for Data System of Onboard Device with Counteraction to Unauthorized Access
Authors: Generalov D.N., Shlegel, Pyrkin N.N. | Published: 03.11.2013 |
Published in issue: #4(81)/2010 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: data system, life cycle, algorithm, unauthorized access, data protection |