-
41
DETECTION OF ANOMALIES IN POWER SYSTEMS: USING THE ISOLATION FOREST MODEL TO IDENTIFY CYBER THREATS
Published 2025-02-01“…Безопасность информационных технологий…”
Get full text
Article -
42
USING ePKI TECHNOLOGY TO SECURELY UPDATE OF EMBEDDED SOFTWARE OF TRUSTED HARDWARE AND SOFTWARE SYSTEM
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
43
SIMULATION OF PERIPHERAL DEVICE SECURITY: IMPLEMENTATION AND PRACTICAL EVLUATION OF ADDRESS SPACES PROTECTION IN A TRUSTED MICROPROCESSOR EMULATOR
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
44
A METHOD FOR INVESTIGATING MACHINE LEARNING ATTACKS ON ARBITER-TYPE PHYSICALLY UNCLONABLE FUNCTIONS
Published 2025-02-01“…Безопасность информационных технологий…”
Get full text
Article -
45
PHYSIOLOGICAL ASPECTS FOR SONOGRAMS BUILDING AND SPECTRUM RESTORE DISTORTED SPEECH VOCALIZATIONS
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
46
RUSSIAN MICROCHIPS: A RETROSPECTIVE OF THE PAST, PRESENT AND FUTURE
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
47
STATISTICAL METHODS USAGE TO IMPROVE DIE WAFERS RADIATION MONITORING EFFICIENCY IN MASS PRODUCTION PROCESS
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
48
ELECTRONICS OF INDIA
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
49
METHODOLOGICAL ASPECTS OF CONSTRUCTING MATHEMATICAL MODELS FOR THE TEMPORARY CHARACTERISTICS OF THREATS OF THE ELECTROMAGNETIC EFFECTS ON COMPLEXES FOR PHYSICAL PROTECTING THE ARC...
Published 2025-02-01“…Безопасность информационных технологий…”
Get full text
Article -
50
USING THE ANYLOGIC ENVIRONMENT FOR MODELING AND ANALYSIS OF THE INFORMATION SECURITY AUDIT PROCESS
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
51
Pseudorandom number generators with self-monitoring of correct operation
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
52
An approach to predicting the properties of software vulnerabilities
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article