MainCatalogInformatics, Computer Engineering and ControlMethods and Systems of Information Protection, Information Security
S-aloha protocol application in in the satellite subsystem with multiple access demand
Authors: Borukaeva A.O., Berdikov P.G., Filatov V.I. | Published: 07.11.2018 |
Published in issue: #10(27)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-10-396 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: satellite communication system, multiple access protocol, packet collision rate, radio channel bandwidth, S-aloha random multiple access protocol, traffic source, radiochannel, radiochannel multiplexing ratio |
Comparative analysis of methods of searching signatures of computer attacks in the dictionary of symbols
Authors: Cheredanova E.M., Pechkurova I.R., Pechkurova V.R., Mamchenko E.A. | Published: 09.08.2018 |
Published in issue: #8(25)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-8-359 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: signature method, DDoS attack, feature dictionary, iteration, hash-function, sequential method, iterative method, hash addressing method |
The methods of prefiltering the telemetry information flow
Authors: Malygina S.V. | Published: 13.06.2018 |
Published in issue: #6(23)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-6-330 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: GPS, GLONASS, data cleaning, telemetry, navigation, monitoring systems, telemetry information processing, motion trajectory visualization |
Mathematical representation of developing risk management principles in grc-solution for the banking system organizations of the Russian federation and its derivation
Authors: Abramova O.S., Posternak E.V. | Published: 11.04.2018 |
Published in issue: #4(21)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-4-294 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: threatening in the area of information, the Bank of Russia, data asset, information security, information security risk assessment, information security tool, adversary model, information security management, information protection level |
Implementing the communication channel between two smart devices by applying the bluetooth technology
Authors: Glebov A.S., Prokhorova Z.R. | Published: 10.04.2018 |
Published in issue: #4(21)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-4-292 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: bluetooth, communication channel, socket, message exchange, delay, RFCOMM, protocol, server, client |
Expert work in HDD disks research
Authors: Dzhandarova R.R. | Published: 17.01.2018 |
Published in issue: #2(19)/2018 | |
DOI: DOI: 10.18698/2541-8009-2018-2-242 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: hard disk drive, HDD-disk, computer forensics, expert, EncaseForensic software package, PC-3000 UDMA software package, diagnostic HDD-disk test, SMART-technology |
Study of USB drives in work of a computer forensic expert
Authors: Pavlova A.A. | Published: 29.11.2017 |
Published in issue: #12(17)/2017 | |
DOI: DOI: 10.18698/2541-8009-2017-12-215 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: USB drive, computer forensic examination, software, damaged devices, data recovery, data retrieval |
Data communication by means of wireless listening devices
Authors: Pavlova A.A. | Published: 12.07.2017 |
Published in issue: #8(13)/2017 | |
DOI: DOI: 10.18698/2541-8009-2017-8-140 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: data transmission, radio transmitting devices, infrared listening devices, vibrational listening devices, laser listening devices, GSM-wiretapping devices |
Ensuring local area network security for small businesses
Authors: Zhukova D.E. | Published: 06.12.2016 |
Published in issue: #3(3)/2016 | |
DOI: DOI: 10.18698/2541-8009-2016-3-28 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: security, local area network, user, intruder, attack |
Detecting information technology risk factors in a telemedicine system
Authors: Mikov D.A. | Published: 02.12.2016 |
Published in issue: #3(3)/2016 | |
DOI: DOI: 10.18698/2541-8009-2016-3-24 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: remote health condition monitoring system, IDEF model, information technology risk analysis, risk factors, information security threats, potential damage, vulnerabilities of an automated system, countermeasures |