Preview

«System analysis and applied information science»

Advanced search

Section Details


Information security

 
Issue Title
 
No 3 (2023) Reasons for the increase in cyber attacks: analysis of technical and non-technical factors Abstract   PDF (Rus)
A. V. Vasilyev
 
No 3 (2022) Mathematical model of a steganographic system based on key information in the form of stegosets Abstract   PDF (Rus)
E. A. Blinova
 
No 2 (2022) Evaluation of the influence of the probability of erasing binary symbols «0» on the probability of erroneous data registration in a quantum-cryptographic communication channel Abstract   PDF (Rus)
A. M. Timofeev
 
No 4 (2021) Approbation of the stochastic group virus protection model Abstract   PDF (Rus)
R. Y. Sharykin
 
No 3 (2021) Optimization of data allocation in hierarchical memory for blocked shortest paths algorithms Abstract   PDF (Eng)
A. A. Prihozhy
 
No 3 (2021) A combined method of formation of a cryptographic key with secret modification of the results of synchronization of artificial neural networks Abstract   PDF (Rus)
M. L. Radziukevich
 
No 3 (2021) Authenticated encryption mode with blocks skipping Abstract   PDF (Eng)
A. V. Sokolov, D. A. Isakov
 
No 2 (2020) The digital watermarking algorithm using discrete chaotic maps Abstract   PDF (Rus)
A. V. Sidorenko, I. V. Shakinko
 
No 1 (2020) Syndrome spectrums of error orbits in RS-codes Abstract   PDF (Rus)
V. A. Lipnitski, S. I. Semyonov
 
No 2 (2019) Generation a shared secret using artificial neural networks Abstract   PDF (Rus)
U. F. Holikau, M. L. Radziukevich
 
No 1 (2019) The influence of the time of single photon transmission of information on the reliability of its reception in a quantum cryptographic communication channel Abstract   PDF (Rus)
A. M. Timofeev
 
No 3 (2018) ACCESS CONTROL IN A LOCAL NETWORK USING THE BASIC CONFIGURATION OF NETWORK DEVICES Abstract   PDF (Rus)
S. N. Petrov, D. V. Ahramenko, S. M Goroshko, T. A. Pulko
 
No 2 (2018) PROPERTIES OF GROUPS G OF DOUBLE ERRORS AND ITS INVARIANTS IN BCH CODES Abstract   PDF (Rus)
V. A. Lipnitskij, A. V. Serada
 
No 2 (2018) THE CLASS OF PERFECT TERNARY ARRAYS Abstract   PDF (Rus)
A. V. Sokolov, O. N. Zhdanov
 
No 1 (2018) RESEARCH OF PARAMETERS OF ENCODING OF THE ALGORITHM WITH VARIABLE FRAGMENTATION OF THE UNIT Abstract   PDF (Rus)
K. O. Zakharova
 
No 4 (2017) USING THE ADAPTED DLP SYSTEM FOR BLOCKING INFORMATION LEAKS Abstract   PDF (Rus)
T. A. Andryianava, S. B. Salomatin
 
No 3 (2017) DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK Abstract   PDF (Rus)
T. A. Andryianava, S. B. Salomatin
 
No 3 (2017) NONLINEAR NYBERG CONSTRUCTION TRANSFORMS OVER ISOMORPHIC REPRESENTATIONS OF FIELDS GALOIS Abstract   PDF (Rus)
A. V. Sokolov, O. N. Zhdanov
 
No 3 (2017) HETEROGENIOUS BLOCKED ALL-PAIRS SHORTEST PATHS ALGORITHM Abstract   PDF (Rus)
A. A. Prihozhy, O. N. Karasik
 
No 2 (2017) HASHING ALGORITHM BASED ON TWO-DIMENSIONAL CHAOTIC MAPPINGS Abstract   PDF (Rus)
A. V. Sidorenko, I. V. Shakinko
 
No 1 (2017) A SYNTHESIS METHOD OF BASIC TERNARY BENT-SQUARES BASED ON THE TRIAD SHIFT OPERATOR Abstract   PDF (Rus)
O. N. Zhdanov, A. V. Sokolov
 
No 2 (2016) IMAGE ENCRYPTION ALGORITHM USING TWO-DIMENSIONAL CHAOTIC MAPS Abstract   PDF (Rus)
A. V. Sidorenko, I. V. Shakinko, Yu. V. Sidorenko
 
No 2 (2016) CRYPTOGRAPHIC KEY IMPROVED PRIVACY UNDER THE CONDITIONS OF SOME OF CRYPTOGRAPHIC KEY VALUE DATA LEAK Abstract   PDF (Rus)
U. F. Holikau, V. L. Pivovarov
 
No 1 (2016) SYNTHESIS METHODS OF ALGEBRAIC NORMAL FORM OF MANY-VALUED LOGIC FUNCTIONS Abstract   PDF (Rus)
A. V. Sokolov, O. N. Zhdanov, O. A. Ayvazian
 
No 4 (2015) PROCESSOR-ORIENTED NONLINEAR TRANSFORM BASED ON THE FULL CLASSES OF ISOMORPHIC AND AUTOMORPHIC REPRESENTATIONS OF GALOIS FIELDS GF(512) AND GF(1024) Abstract   PDF (Rus)
A. V. Sokolov
 
No 3 (2015) DIFFERENTIAL AND LINEAR CRYPTOANALYSIS METHODS ELEMENTS FOR ENCRYPTION ALGORITHM BASED ON DYNAMIC CHAOS Abstract   PDF (Rus)
A. V. Sidorenko, L. A. Zhukovets
 
1 - 26 of 26 Items