-
21
METHODOLOGY FOR VERIFYING THE CHIP AUTHENTICITY BASED ON DYNAMIC ENERGY CONSUMPTION ANALYSIS
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
22
EXTENDED CYBEREASON’S SOC MATURITY MODEL
Published 2025-02-01“…Безопасность информационных технологий…”
Get full text
Article -
23
TRUSTWORTHY OF INTEGRATED CIRCUITS: CHARACTERISTICS AND REASONS FOR THEIR VIOLATION
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
24
Single event effects radiation testing requirements: a minimax approach
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
25
Feasibility Analysis of Using X-ray Inspection Systems for Assessing the Mass Thickness of Integrated Circuit Packages
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
26
DEVELOPMENT OF MODELS AND METHODOLOGY FOR ASSESSING THE INVADER'S AWARENESS OF THE ATTACKED ELEMENTS OF A DISTRIBUTED INFORMATION SYSTEM
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
27
IMPROVING THE ACCURACY OF DETERMINING DEVIANT GROUPS IN THE SELECTION AND MONITORING OF THE CRITICAL INFORMATION INFRASTRUCTURE ENTERPRISES STAFF
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
28
EDITOR-IN-CHIEF'S COLUMN
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
29
THERE IS A GOOD TRADITION: EVERY FEBRUARY WE GO TO THE "CURRENT ISSUES OF INFORMATION PROTECTION" WITHIN THE FRAMEWORK OF TB FORUM
Published 2025-02-01“…Безопасность информационных технологий…”
Get full text
Article -
30
MALWARE DETECTION CAPABILITIES FOR MOBILE DEVICES RUNNING ANDROID OS BY MONITORING HARDWARE RESOURCE CONSUMPTION
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
31
PARTICIPATION IN THE 34TH CONFERENCE "METHODS AND TECHNICAL MEANS OF INFORMATION SECURITY 2025" (MITSUBISHI 2025)
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
32
Special embedded software of trusted electronic component
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
33
RUSSIAN ROBOTICS NEEDS COMPONENTS AND TECHNOLOGIES
Published 2025-02-01“…Безопасность информационных технологий…”
Get full text
Article -
34
ANALYSIS AND IMPLEMENTATION OF A CRYPTOSYSTEM BASED ON NON-INJECTIVE KNAPSACKS
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
35
FORMALIZATION OF THE STAGE OF SEARCHING FOR MODULATED SIDE ELECTROMAGNETIC RADIATIONS AND INTERFERENCES IN THE PROCESS OF MODELING THE FUNCTION OF INTERCEPTING THESE SIGNALS
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
36
SINGLE EVENT EFFECTS RADIATION TESTING REQUIREMENTS: A BAYESIN AN APPROACH
Published 2025-02-01“…Безопасность информационных технологий…”
Get full text
Article -
37
CONSEQUENCES OF IGNORING "MODERN" ECB AND REA DEVELOPMENT STANDARDS
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
38
IMPORT SUBSTITUTION OF GEODETIC HARDWARE AND SOFTWARE COMPLEXES AS A GUARANTEE OF SECURITY, RELIABILITY AND AVAILABILITY OF SPATIAL DATA
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
39
AN ALGORITHM FOR GENERATING WORD LISTS WITH A SPECIFIED BIGRAM DISTRIBUTION FOR KEYSTROKE DYNAMICS BIOMETRIC TEMPLATE REGISTRATION
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
40
ENHANCING EXPLAINABILITY IN DEEPFAKE DETECTION WITH GRAPH ATTENTION NETWORKS
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article