|
Preface I. A. Sokolov, A. A. Grusho
|
3–6 |
|
Covert channels generated by tags N. A. Grusho
|
7–13 |
|
New principles of modeling of autonomous self-propagating malware M. V. Levykin
|
14–26 |
|
Linux-based operating systems vulnerabilities searching methods A. I. Mishchenko
|
27–32 |
|
Attacks on the centralized systems of intrusion detection A. A. Timonina, E. E. Timonina
|
33–42 |
|
On a method of reliable delivery and data source verification within a client–server interaction over an open communication channel E. V. Piskovskiy
|
43–52 |
|
On optimal authentication code S. M. Ratseev
|
53–57 |
|
On the problem of subsequences inclusion into the data packages headers M. I. Zabezhailo
|
58–68 |
|
Characteristics of hardware-based field-programmable gate array implementation of network traffic analyzer for malicious code detection M. Samoylov, D. Gamayunov, S. Bezzubtsev, M. Bulgakov
|
69–79 |
|
Nonlinear correlational modeling and aftersale product service systems reliability analysis I. N. Sinitsyn, A. S. Shalamov, A. A. Kuleshov
|
80–104 |
|
Some approaches to developing thin client technologies for secure information systems E. Korepanov
|
105–112 |
|
About some particularities of spare parts sets calculation for secured information systems A. A. Zatsarinny, A. I. Garanin, S. V. Kozlov, V. A. Kondrashev
|
113–131 |
|
Some tests for software reliability V. Yu. Korolev
|
132–142 |
|
Automatic generation of vizual representation of the document's semantic content V. N. Zakharov, A. A. Khoroshilov
|
143–158 |