Systems and Means of Informatics scientific journal
Volume 23, Issue 1, 2013
Content   
Abstract and Keywords   
About Authors
 
  
COVERT CHANNELS GENERATED BY TAGS.
  - N. A. Grusho   IPI RAN, info@itake.ru
  
  
NEW PRINCIPLES OF MODELING OF AUTONOMOUS SELF-PROPAGATING  MALWARE.
  - M. V. Levykin   IPI RAN, de_shiko@yahoo.com
  
  
LINUX-BASED OPERATING SYSTEMS VULNERABILITIES
SEARCHING  METHODS.
  - A. I. Mishchenko   IPI RAN, alximi@gmail.com
  
  
ATTACKS ON THE CENTRALIZED SYSTEMS OF INTRUSION DETECTION.
  - A. A. Timonina   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov
Moscow State University, toniat@yandex.ru
  
 - E. E. Timonina   IPI RAN, eltimon@yandex.ru 
  
  
ON A METHOD OF RELIABLE DELIVERY AND DATA SOURCE
VERIFICATION WITHIN A CLIENT–SERVER INTERACTION
OVER AN OPEN COMMUNICATION CHANNEL.
  - E. V. Piskovskiy   Moscow Institute of Physics and Technology (State University),
evgeny.piskovsky@gmail.com
  
  
ON OPTIMAL AUTHENTICATION CODE.
  - S.M. Ratseev   Faculty of Mathematics and Information Technologies, Ulyanovsk State University,
RatseevSM@mail.ru
  
  
ON THE PROBLEM  OF SUBSEQUENCES INCLUSION
INTO THE DATA PACKAGES HEADERS.
  - M. I. Zabezhailo   Applied Research Center for Computer Networks, Moscow, Skolkovo,
MZabezhailo@ arccn.ru
  
  
CHARACTERISTICS OF HARDWARE-BASED FIELD-PROGRAMMABLE
GATE ARRAY IMPLEMENTATION OF NETWORK TRAFFIC ANALYZER
FOR MALICIOUS CODE DETECTION.
  - M. Samoylov   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov
Moscow State University, samoylov@lvk.cs.msu.su
  
 - D. Gamayunov   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov
Moscow State University, gamajun@cs.msu.su
  
 - S. Bezzubtsev   Lebedev Institute of Precision Mechanics and Computer Engineering, Russian
Academy of Sciences, stas.bezzubtsev@gmail.com
  
 - M. Bulgakov   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov
Moscow State University, bulgakov@cs.msu.su      
  
  
NONLINEAR CORRELATIONAL  MODELING AND AFTERSALE
PRODUCT SERVICE SYSTEMS RELIABILITY ANALYSIS.
  - I. N. Sinitsyn   IPI RAN, sinitsin@dol.ru
  
 - A. S. Shalamov   IPI RAN, a-shal5@yandex.ru
  
 - A. A. Kuleshov   IPI RAN, nordixsi@gmail.com     
  
  
SOME APPROACHES TO DEVELOPING THIN CLIENT TECHNOLOGIES
FOR SECURE INFORMATION SYSTEMS.
  - E. Korepanov   IPI RAN, ekorepanov@ipiran.ru
  
  
ABOUT SOME PARTICULARITIES OF SPARE PARTS SETS
CALCULATION FOR SECURED INFORMATION SYSTEMS.
  - A. A. Zatsarinny   IPI RAN, azatsarinny@ipiran.ru
  
 - A. I. Garanin   IPI RAN, agaramin@ipiran.amsd.ru
  
 - S. V. Kozlov   IPI RAN, sv kozlov@mail.ru
  
 - V. A. Kondrashev   IPI RAN, vkondrashev@ipiran.ru       
  
  
SOME TESTS FOR SOFTWARE RELIABILITY.
  - V. Yu. Korolev   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov
Moscow State University; IPI RAN, victoryukorolev@yandex.ru
  
  
AUTOMATIC GENERATION OF VIZUAL REPRESENTATION
OF THE DOCUMENT’S SEMANTIC CONTENT.
  - V.N. Zakharov   IPI RAN, vzakharov@ipiran.ru 
  
 - A. A. Khoroshilov   Center of Information Technologies and Systems for Executive Power Authorities,
A.A.Khoroshilov@yandex.ru  
  
	   |