|
Tools for development of neural components of intelligent security systems Ph. G. Nesteruk, I. V. Kotenko
|
7 |
|
Design of the ontology based data model for the network attack modeling system A. A. Chechulin, I. V. Kotenko, O. V. Polubelova
|
26 |
|
Technique of rapid construction, modification and analysis of attack trees A. A. Chechulin
|
40 |
|
Security metrics and security assessment techniques for the computer networks on the base of the attack graphs. E. V. Doynikova
|
54 |
|
Securing applications running trading platform MetaTrader keys Sentinel Hasp. A. A. Musaev, I. V. Anantchenko
|
69 |
|
Architecture and software implementation of the system of verification of filtering rules O. V. Polubelova
|
79 |
|
Measurement of program code security R. R. Fatkieva, E. L. Evnevich
|
91 |
|
Research of computer attacks by means of the observed traffic singular spectrum analysis D. K. Levonevskiy, Yu. A. Pichugin, R. R. Fatkieva
|
101 |
|
Detecting and identifying malicious executable binaries with Data Mining methods D. V. Komashinskiy
|
115 |
|
An approach to detect malicious documents based on Data Mining techniques D. V. Komashinskiy
|
126 |
|
Predictor Mining: Data Mining application to Social Computing A. A. Azarov, E. V. Brodovskaya, A. Yu. Bubnov, R. Ya. Gibadulin, A. A. Glazkov, O. V. Dmitrieva, A. M. Dolgorukov, R. I. Zhdanov, V. F. Musina, V. D. Nechaev, A. S. Ognev, A. V. Sirotkin, A.V. Suvorova, V. V. Titov, A. L. Tulupyev, T. V. Tulupyeva, A. A. Filchenkov, R. M. Yusupov
|
136 |
|
The potential of using radiolocation criteria to detect characteristic indications of objects of research N. V. Ivantsevich, S. B. Roudnitsky
|
162 |
|
Automated questionnaire based on the questions about the episodes of respondents’ risky behavior: primary analysis of application results A.V. Suvorova, V. F. Musina, T. V. Tulupyeva, A. L. Tulupyev, T. V. Krasnoselskih, A. A. Filchenkov, A. A. Azarov, N. Abdala
|
175 |
|
Evaluating the performance of complex systems on a hierarchical system of indices S. N. Zhuk
|
194 |
|
Virtual evidence transmission algorithm preserving the global consistency property of algebraic Bayesian networks K. V. Frolenkov
|
204 |
|
Approaches for algebraic Bayesian networks primary structure cyclicity elimination A. V. Byatkin, A. A. Filchenkov, A. L. Tulupyev, V. F. Musina, K. V. Frolenkov
|
216 |
|
The redundant variables method for checking and correction of computing processes in real time M. B. Ignat'ev, T. S. Katermina
|
234 |
|
Singular matrix bundles in a generalized symmetric problem of eigenvalues A. I. Kochura, L. V. Podkolzina, Ya. A. Ivakin, I. I. Nidziev
|
253 |
|
An algebraic interpretation of 2-factor binary sufficient component cause theory V. G. Panov, Yu. V. Nagrebetskaya
|
277 |
|
Variability Management Tools — readiness for industrial use D. V. Koznov, I. A. Novitskii, M. N. Smirnov
|
297 |
|
Usage of Speech Signal Segmentation for the Construction of Complex Model in the Speaker Identification System. T. V. Yermolenko, M. S. Klymenko
|
332 |
|
Tools of Integrated Technology for Analysis and Verification of Telecom Application Specs I. S. Anureev, S. N. Baranov, D. M. Beloglazov, E. V. Bodin, P. D. Drobintsev, A. V. Kolchin, V. P. Kotlyarov, A. A. Letichevskii, O. A. Letychevskyi, V. A. Nepomnyashchii, I. V. Nikiforov, S. V. Potiyenko, L. V. Priima, B. V. Tyutin
|
349 |
|
The laboratory of biomedical informatics at SPIIRAS V. A. Dyuk, S. B. Roudnitsky
|
384 |
|
Exposition of computer facilities in the museum of SPIIRAS history R. R. Fatkieva
|
401 |