Quick jump to page content
Main Navigation
Main Content
Sidebar
Login
Toggle navigation
Main page
Current
About the Journal
The journal policy
Editorial Team
Publishing Ethics
Regulation On The Review
For Authors
Manuscript submission rules
Requirements for the preparation of manuscripts
Ethical Principles for Authors
Archives
Contact
Search
Home
Archives
Vol 2 No 52 (2024): Journal of the Ural Federal District. Information security
Published:
2024-08-21
Full Issue
PDF (Русский)
Systems Analysis, Management and Information Processing
CLASSIFICATION TREESBASED SCORING SYSTEM DEVELOPMENT
Юлиана Александровна Крыжановская, Татьяна Викторовна Курченкова
5-12
PDF (Русский)
NEURO-LINGUISTIC IDENTIFICATION OF ARTIFICIAL INTELLIGENCE SYSTEMS
Владимир Владимирович Котенко, Константин Евгеньевич Румянцев, Лаура Куйраевна Хаджиева
13-23
PDF (Русский)
Methods and systems of information protection, information security
A PROBABILISTIC METHOD FOR SUBSTANTIATING INDICATORS AND CRITERIA FOR THE EFFECTIVENESS OF PROTECTING SPEECH INFORMATION FROM ITS LEAKAGE THROUGH TECHNICAL CHANNELS
Анатолий Анатольевич Хорев, Илья Сергеевич Порсев
24-36
PDF (Русский)
APPLICATION OF TWO-SIDED SIGNALING GAME IN DECEPTION TECHNOLOGIES TO SELECT THE OPTIMAL DEFENSE STRATEGY
Никита Дмитриевич Котельников, Маргарита Владимировна Афанасьева, Инна Ильинична Баранкова
37-45
PDF (Русский)
PROBLEMS OF PROTECTING TECHNOLOGICAL INDUSTRIAL ENTERPRISES NETWORKS
Ульяна Владимировна Кузьмина, Иван Владимирович Бачурин, Ольга Евгеньевна Михайлова
46-55
PDF (Русский)
ABOUT ASSESSING INFORMATION SECURITY RISKS BASED ON THE APPLICATION OF FUZZY COGNITIVE MAPS IN INTELLIGENT TRANSPORT TRAFFIC MANAGEMENT SYSTEMS
Анна Сергеевна Ожгибесова, Андрей Сергеевич Шабуров, Александр Анатольевич Южаков
56-67
PDF (Русский)
STATISTICAL MODEL FOR ASSESSING THE IMPACT OF THE COMBINED ACTIVE SCANNING METHOD ON THE STABILITY OF THE INDUSTRIAL CONTROL NETWORK
Александр Николаевич Соколов, Андрей Витальевич Быкасов
68-76
PDF (Русский)
APPROACHES TO CLASSIFYING ATTACK VECTORS AND VULNERA-BILITIES OF JSON WEB TOKENS
Искандер Рашитович Зулькарнеев, Константин Алексеевич Басалай
77-88
PDF (Русский)
PROBLEMS OF DEVELOPING A THREAT MODEL FOR HETEROGENEOUS DATA STORAGE CONTROL NETWORK
Сергей Владимирович Поршнев, Ольга Алексеевна Пономарева
89-98
PDF (Русский)
ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR SOLVING AUTHENTICATION PROBLEMS
Артем Павлович Воробьев, Елена Львовна Кротова, Елена Юрьевна Воробьева
99-105
PDF (Русский)
AN INVESTIGATION THE APPLICATION OF FUZZY NEURAL EXTRACTORS FOR FACE ANTI-SPOOFING
Ирина Евгеньевна Панфилова, Павел Сергеевич Ложников
106-121
PDF (Русский)