-
1
STRATEGY OF ELECTRONIC SOVEREIGNTY
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
2
Model for assessing the effectiveness of information security systems
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
3
Computational methods and technical means of processing signals of side electromagnetic emanation
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
4
MANAGING THE SECURITY OF GOVERNMENT INFORMATION SYSTEMS AS CRITICAL INFORMATION INFRASTRUCTURE OBJECTS
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
5
AN IDEA FOR KNAPSACK CRYPTOSYSTEM BACKDOOR
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
6
DATA MODELS FOR INCIDENT RESPONSE AUTOMATIZATION
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
7
EDITOR-IN-CHIEF'S COLUMN
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
8
A METHOD OF ELIMINATING MALICIOUS PERTURBATIONS EMBEDDED BY L0-OPTIMIZED ATTACKS
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
9
FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
10
The influence of an impulsed ion radiation on the sensitivity parameters of integrated circuits to single event effects
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
11
COMPUTATIONAL THINKING IN THE PROBLEM OF RELIABLE AND SECURE DATA TRANSMISSION OVER A COMMUNICATION CHANNEL
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
12
CLASS IMBALANCE PROBLEM IN ANTI-FRAUD PROBLEM: METRICS, SAMPLING AND CONVOLUTIONAL NEURAL NETWORKS
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
13
An ensemble of modern computer vision models for deepfake detection
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
14
PERFORMANCE AND TRUST OF COMPUTING SYSTEMS
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
15
MODELLESS PROCESSING OF DIODE MICROCURRENT DATA SPECIFIED AS TRENDLESS SEQUENCES (Selection of diodes according to the criterion of compliance with the reference group)
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
16
A METHOD OF INCREASING THE INTEGRITY OF INFORMATION STORED IN DATA STORAGE SYSTEMS BY COMBINING SYNDROME AND PROBABILISTIC DECODING
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
17
"EXPERT SESSION "TRUSTED PAK: SWAN, CRAB AND PIKE IN RUSSIAN ELECTRONICS" AT ExpoElectronica 2025
Published 2025-05-01“…Безопасность информационных технологий…”
Get full text
Article -
18
SECURITY ASSESSMENT OF MOODLE-BASED DISTANCE LEARNING SYSTEM COMPONENTS USING STATIC ANALYSIS TOOLS
Published 2025-07-01“…Безопасность информационных технологий…”
Get full text
Article -
19
Functional modeling of formalization malware implementation tactics
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
20
THE RESULTS OF THE STUDY OF INTENTIONAL ELECTROMAGNETIC INTERFERENCE ON DISRUPTION OF THE FUNCTIONING OF UNMANNED VECHICLES
Published 2025-02-01“…Безопасность информационных технологий…”
Get full text
Article