Journals
Books
Articles by keyword система защиты информации
Methodology of creation of complex information security for informatization object
V. I. Korolev
Actual security threats information and control systems of critical objects
А. S. Shaburov - Ph.D. (Eng.), Associate Professor, Perm National Research Polytechnic University. E-mail: shans@at.pstu.ru
R. B. Rashevskiy - Student, Perm National Research Polytechnic University. E-mail: roman@rashevskiy.com
Model of information conflict between special software and information security subsystem of information-technical tool
A.A. Boyko - Ph. D. (Eng.), Associate Professor, Head of Department, Military Educational and Scientific Center «Zhukovsky-Gagarin Air Force Academy» (Voronezh) S.A. Budnikov - Dr. Sc. (Eng.), Associate Professor, Head of Department, Military Educational and Scientific Center «Zhukovsky-Gagarin Air Force Academy» (Voronezh)
The methodic of determining the part of corporate information-telecommunication network with anomalous behavior
M.M. Monakhova - Ph. D. (Eng.), Senior Lecturer, Department of Informatics and Information Security, Vladimir State University named after A.&N. Stoletovs E-mail: mariya.monakhova@gmail.com G.V. Putintsev - Student, Engineer, Department of Informatics and Information Security, Vladimir State University named after A.&N. Stoletovs E-mail: putigr@mail.ru
Information security models of real-time multiprocessor computing systems

V.О. Volosenkov1, О.V. Platonova2, L.М. Zheleznyak3, L.V. Kazantseva4

1 JSC «Concern « Marines–Agat» (Moscow, Russia)

2–4 MIREA – Russian Technological University (Moscow, Russia)