Showing 21 - 40 results of 52 for search '"Безопасность информационных технологий"', query time: 0.05s Refine Results
  1. 21
  2. 22

    EXTENDED CYBEREASON’S SOC MATURITY MODEL by Ilya S. Listratov, Natalia G. Miloslavskaya, Ilya S. Sirbay, Brito A. Reinoso

    Published 2025-02-01
    “…Безопасность информационных технологий…”
    Get full text
    Article
  3. 23

    TRUSTWORTHY OF INTEGRATED CIRCUITS: CHARACTERISTICS AND REASONS FOR THEIR VIOLATION by Sergey G. Mosin

    Published 2025-05-01
    “…Безопасность информационных технологий…”
    Get full text
    Article
  4. 24
  5. 25
  6. 26
  7. 27
  8. 28

    EDITOR-IN-CHIEF'S COLUMN by Alexander Yu. Nikiforov

    Published 2024-11-01
    “…Безопасность информационных технологий…”
    Get full text
    Article
  9. 29

    THERE IS A GOOD TRADITION: EVERY FEBRUARY WE GO TO THE "CURRENT ISSUES OF INFORMATION PROTECTION" WITHIN THE FRAMEWORK OF TB FORUM by Leonid N. Kessarinskiy

    Published 2025-02-01
    “…Безопасность информационных технологий…”
    Get full text
    Article
  10. 30

    MALWARE DETECTION CAPABILITIES FOR MOBILE DEVICES RUNNING ANDROID OS BY MONITORING HARDWARE RESOURCE CONSUMPTION by Andrew M. Bonch-Bruevich, Alyona A. Borisovskaya

    Published 2025-07-01
    “…Безопасность информационных технологий…”
    Get full text
    Article
  11. 31

    PARTICIPATION IN THE 34TH CONFERENCE "METHODS AND TECHNICAL MEANS OF INFORMATION SECURITY 2025" (MITSUBISHI 2025) by Leonid N. Kessarinskiy

    Published 2025-07-01
    “…Безопасность информационных технологий…”
    Get full text
    Article
  12. 32

    Special embedded software of trusted electronic component by Oleg N. Dyakov

    Published 2024-11-01
    “…Безопасность информационных технологий…”
    Get full text
    Article
  13. 33

    RUSSIAN ROBOTICS NEEDS COMPONENTS AND TECHNOLOGIES by Evgeny A. Dudorov

    Published 2025-02-01
    “…Безопасность информационных технологий…”
    Get full text
    Article
  14. 34

    ANALYSIS AND IMPLEMENTATION OF A CRYPTOSYSTEM BASED ON NON-INJECTIVE KNAPSACKS by Maria Sabina A. Volkov

    Published 2025-07-01
    “…Безопасность информационных технологий…”
    Get full text
    Article
  15. 35
  16. 36
  17. 37

    CONSEQUENCES OF IGNORING "MODERN" ECB AND REA DEVELOPMENT STANDARDS by Evgeny A. Mordkovich

    Published 2025-05-01
    “…Безопасность информационных технологий…”
    Get full text
    Article
  18. 38
  19. 39

    AN ALGORITHM FOR GENERATING WORD LISTS WITH A SPECIFIED BIGRAM DISTRIBUTION FOR KEYSTROKE DYNAMICS BIOMETRIC TEMPLATE REGISTRATION by Evgeniy V. Shklyar

    Published 2025-07-01
    “…Безопасность информационных технологий…”
    Get full text
    Article
  20. 40

    ENHANCING EXPLAINABILITY IN DEEPFAKE DETECTION WITH GRAPH ATTENTION NETWORKS by Aleksandr S. Pikul, Ilya Yu. Popov

    Published 2025-05-01
    “…Безопасность информационных технологий…”
    Get full text
    Article