Search
Since 1999
ISSN 2071-8217
Английский
Русский
Version for the visually impaired
Main
Journal Information
Menu
About Journal
Editorial Board
Subscription
Journal Metrics
Guide for Authors
Menu
Paper Rules
Rules of Paper Design
Reviewing
References
Abstract
Reviewer
Menu
Review Policy
Archive
Publication Ethics
Artificial Intelligence
News
Contacts
Contacts
Articles
No. 1, 2022
Year: 2022
Issue: 1
Pages: 133
0
94
Previous issue
All issues
Next issue
Submit Your Paper
XML
Latest issues
2025
,
Issue 3
2025
,
Issue Спецвыпуск
2025
,
Issue 2
2025
,
Issue 1
ASSESSMENT OF THE EFFICIENCY OF PROTECTION SYSTEMS OF COMPUTER NETWORKS FROM VIRAL ATTACKS
Information security aspects
ANISIMOV Vladimir G.
ANISIMOV Evgeny G
SAURENKO Tatyana N.
LOS Vladimir P.
0
16
Pages: 11-17
DATABASE PROTECTION AGAINST INSIGHT ATTACKS REACTIVE AND PROACTIVE METHODS
Information security application
Poltavtsev A. A
0
15
Pages: 18-31
ANALYSIS OF HACKER GROUPS SOFTWARE TOOLS USING AT&T'S MITRE KNOWLEDGE BASE
Software security
KRIULIN Artur A.
EREMEEV Mihail A.
POTERPEEV German Yu.
0
15
Pages: 32-40
IMMUNIZATION OF COMPLEX NETWORKS: TOPOLOGY AND METHODS
Network and telecommunication security
FATIN Aleksander D.
Pavlenko E. Yu.
0
16
Pages: 41-50
METHODOLOGY FOR DETECTING ANOMALIES IN THE TRAFFIC OF THE INTERNET OF THINGS
Network and telecommunication security
Tatarnikova T. M.
SVERLIKOV Alexander V.
Sikarev I. A.
0
15
Pages: 51-57
CRYPTOGRAPHIC CONTROL OF DATA INTEGRITY ACCORDING TO THE RULES OF CONSTRUCTION OF THE REED-SOLOMON CODE
Applied cryptography
STARIKOV Timofey V.
SOPIN Kirill Yu.
Dichenko S. A.
SAMOILENKO Dmitry V.
0
17
Pages: 58-67
🍪
We use cookies and recommendation technologies to enhance the website's performance. By continuing to use this site
you agree to the use of cookies
.
Accept