RUS  ENG
Full version
JOURNALS // Informatics and Automation // Archive

2013, Issue 26


Tools for development of neural components of intelligent security systems
Ph. G. Nesteruk, I. V. Kotenko
7
Design of the ontology based data model for the network attack modeling system
A. A. Chechulin, I. V. Kotenko, O. V. Polubelova
26
Technique of rapid construction, modification and analysis of attack trees
A. A. Chechulin
40
Security metrics and security assessment techniques for the computer networks on the base of the attack graphs.
E. V. Doynikova
54
Securing applications running trading platform MetaTrader keys Sentinel Hasp.
A. A. Musaev, I. V. Anantchenko
69
Architecture and software implementation of the system of verification of filtering rules
O. V. Polubelova
79
Measurement of program code security
R. R. Fatkieva, E. L. Evnevich
91
Research of computer attacks by means of the observed traffic singular spectrum analysis
D. K. Levonevskiy, Yu. A. Pichugin, R. R. Fatkieva
101
Detecting and identifying malicious executable binaries with Data Mining methods
D. V. Komashinskiy
115
An approach to detect malicious documents based on Data Mining techniques
D. V. Komashinskiy
126
Predictor Mining: Data Mining application to Social Computing
A. A. Azarov, E. V. Brodovskaya, A. Yu. Bubnov, R. Ya. Gibadulin, A. A. Glazkov, O. V. Dmitrieva, A. M. Dolgorukov, R. I. Zhdanov, V. F. Musina, V. D. Nechaev, A. S. Ognev, A. V. Sirotkin, A.V. Suvorova, V. V. Titov, A. L. Tulupyev, T. V. Tulupyeva, A. A. Filchenkov, R. M. Yusupov
136
The potential of using radiolocation criteria to detect characteristic indications of objects of research
N. V. Ivantsevich, S. B. Roudnitsky
162
Automated questionnaire based on the questions about the episodes of respondents’ risky behavior: primary analysis of application results
A.V. Suvorova, V. F. Musina, T. V. Tulupyeva, A. L. Tulupyev, T. V. Krasnoselskih, A. A. Filchenkov, A. A. Azarov, N. Abdala
175
Evaluating the performance of complex systems on a hierarchical system of indices
S. N. Zhuk
194
Virtual evidence transmission algorithm preserving the global consistency property of algebraic Bayesian networks
K. V. Frolenkov
204
Approaches for algebraic Bayesian networks primary structure cyclicity elimination
A. V. Byatkin, A. A. Filchenkov, A. L. Tulupyev, V. F. Musina, K. V. Frolenkov
216
The redundant variables method for checking and correction of computing processes in real time
M. B. Ignat'ev, T. S. Katermina
234
Singular matrix bundles in a generalized symmetric problem of eigenvalues
A. I. Kochura, L. V. Podkolzina, Ya. A. Ivakin, I. I. Nidziev
253
An algebraic interpretation of 2-factor binary sufficient component cause theory
V. G. Panov, Yu. V. Nagrebetskaya
277
Variability Management Tools — readiness for industrial use
D. V. Koznov, I. A. Novitskii, M. N. Smirnov
297
Usage of Speech Signal Segmentation for the Construction of Complex Model in the Speaker Identification System.
T. V. Yermolenko, M. S. Klymenko
332
Tools of Integrated Technology for Analysis and Verification of Telecom Application Specs
I. S. Anureev, S. N. Baranov, D. M. Beloglazov, E. V. Bodin, P. D. Drobintsev, A. V. Kolchin, V. P. Kotlyarov, A. A. Letichevskii, O. A. Letychevskyi, V. A. Nepomnyashchii, I. V. Nikiforov, S. V. Potiyenko, L. V. Priima, B. V. Tyutin
349
The laboratory of biomedical informatics at SPIIRAS
V. A. Dyuk, S. B. Roudnitsky
384
Exposition of computer facilities in the museum of SPIIRAS history
R. R. Fatkieva
401


© Steklov Math. Inst. of RAS, 2025