Eng | Rus

“Systems and Means of Informatics” scientific journal

Volume 23, Issue 1, 2013

Content   Abstract and Keywords   About Authors

COVERT CHANNELS GENERATED BY TAGS.

  • N. A. Grusho   IPI RAN, info@itake.ru

NEW PRINCIPLES OF MODELING OF AUTONOMOUS SELF-PROPAGATING MALWARE.

  • M. V. Levykin   IPI RAN, de_shiko@yahoo.com

LINUX-BASED OPERATING SYSTEMS VULNERABILITIES SEARCHING METHODS.

  • A. I. Mishchenko   IPI RAN, alximi@gmail.com

ATTACKS ON THE CENTRALIZED SYSTEMS OF INTRUSION DETECTION.

  • A. A. Timonina   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov Moscow State University, toniat@yandex.ru
  • E. E. Timonina   IPI RAN, eltimon@yandex.ru

ON A METHOD OF RELIABLE DELIVERY AND DATA SOURCE VERIFICATION WITHIN A CLIENT–SERVER INTERACTION OVER AN OPEN COMMUNICATION CHANNEL.

  • E. V. Piskovskiy   Moscow Institute of Physics and Technology (State University), evgeny.piskovsky@gmail.com

ON OPTIMAL AUTHENTICATION CODE.

  • S.M. Ratseev   Faculty of Mathematics and Information Technologies, Ulyanovsk State University, RatseevSM@mail.ru

ON THE PROBLEM OF SUBSEQUENCES INCLUSION INTO THE DATA PACKAGES HEADERS.

  • M. I. Zabezhailo   Applied Research Center for Computer Networks, Moscow, Skolkovo, MZabezhailo@ arccn.ru

CHARACTERISTICS OF HARDWARE-BASED FIELD-PROGRAMMABLE GATE ARRAY IMPLEMENTATION OF NETWORK TRAFFIC ANALYZER FOR MALICIOUS CODE DETECTION.

  • M. Samoylov   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov Moscow State University, samoylov@lvk.cs.msu.su
  • D. Gamayunov   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov Moscow State University, gamajun@cs.msu.su
  • S. Bezzubtsev   Lebedev Institute of Precision Mechanics and Computer Engineering, Russian Academy of Sciences, stas.bezzubtsev@gmail.com
  • M. Bulgakov   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov Moscow State University, bulgakov@cs.msu.su

NONLINEAR CORRELATIONAL MODELING AND AFTERSALE PRODUCT SERVICE SYSTEMS RELIABILITY ANALYSIS.

  • I. N. Sinitsyn   IPI RAN, sinitsin@dol.ru
  • A. S. Shalamov   IPI RAN, a-shal5@yandex.ru
  • A. A. Kuleshov   IPI RAN, nordixsi@gmail.com

SOME APPROACHES TO DEVELOPING THIN CLIENT TECHNOLOGIES FOR SECURE INFORMATION SYSTEMS.

  • E. Korepanov   IPI RAN, ekorepanov@ipiran.ru

ABOUT SOME PARTICULARITIES OF SPARE PARTS SETS CALCULATION FOR SECURED INFORMATION SYSTEMS.

  • A. A. Zatsarinny   IPI RAN, azatsarinny@ipiran.ru
  • A. I. Garanin   IPI RAN, agaramin@ipiran.amsd.ru
  • S. V. Kozlov   IPI RAN, sv kozlov@mail.ru
  • V. A. Kondrashev   IPI RAN, vkondrashev@ipiran.ru

SOME TESTS FOR SOFTWARE RELIABILITY.

  • V. Yu. Korolev   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov Moscow State University; IPI RAN, victoryukorolev@yandex.ru

AUTOMATIC GENERATION OF VIZUAL REPRESENTATION OF THE DOCUMENT’S SEMANTIC CONTENT.

  • V.N. Zakharov   IPI RAN, vzakharov@ipiran.ru
  • A. A. Khoroshilov   Center of Information Technologies and Systems for Executive Power Authorities, A.A.Khoroshilov@yandex.ru

 

RUS