Journals
Books
Articles by keyword уязвимости
Some approach of interacted vulnerabilities research in binary software without sources
A.V. Blagodarenko
The information-analytical technique of risk assessment in the problems of security management at dangerous objects
A.I. Vaguine, N.G. Volchenkov, I.E. Kouznetsov
Solving computer security problems through deterministic replay of virtual machines
P.M. Dovgalyuk - Ph.D., Assistant professor in Yaroslav-the-Wise Novgorod State University. E-mail: Pavel.Dovgaluk@ispras.ru
N.I. Fursova - Student of Yaroslav-the-Wise Novgorod State University. E-mail: Natalia.Fursova@ispras.ru
D.S. Dmitriev - Student of Yaroslav-the-Wise Novgorod State University. E-mail: Denis.Dmitriev@ispras.ru
ICS Security control by detecting and fixing vulnerabilities
D.A. Moskvin - Ph.D. (Eng.) Neobit Ltd. E-mail: moskvin@neo-bit.ru
Hypervisor threat model in cloud systems
D.P. Zegzhda - Dr.Sc. (Eng.), Professor department IBKS, National Research University St. Petersburg State Polytechnical University. E-mail: zeg@ibks.ftk.spbstu.ru
A.V. Nikolskiy - Assistant department IBKS, National Research University St. Petersburg State Polytechnical University. E-mail: alexei.nikolsky@ibks.ftk.spbstu.ru
Topical issues of identifying vulnerabilities and undeclared capabilities in software

A.V. Barabanov – Ph.D.(Eng.), Deputy General Director of NPO «Echelon» (Moscow)

E-mail: a.barabanov@npo-echelon.ru

A.S. Markov – Dr.Sc.(Eng.), President of NPO «Echelon» (Moscow)

E-mail: a.markov@npo-echelon.ru

V.L. Tsirlov – Ph.D.(Eng.), General Director of NPO «Echelon» (Moscow) E-mail: v.tsirlov@npo-echelon.ru

Methods of identification and evaluation of vulnerable links of automated process control systems

D.V. Chernov – Assistant, 

Department «Information Security», Tula State University; Head of the Information Security Sector, JSC ADC (Tula) E-mail: cherncib@gmail.com

A.A. Sychugov – Ph.D.(Eng.), Associate Professor, 

Head of Department «Information Security», Tula State University E-mail: xru2003@list.ru