Journals
Books
Articles by keyword vulnerabilities
Some approach of interacted vulnerabilities research in binary software without sources
A.V. Blagodarenko
User-s vulnerabilities profile modeling for socio-engineering attacks protection evaluation
A.A. Azarov - Post-graduate Student, SPIIRAS, Saint Petersburg State University
Solving computer security problems through deterministic replay of virtual machines
P.M. Dovgalyuk - Ph.D., Assistant professor in Yaroslav-the-Wise Novgorod State University. E-mail: Pavel.Dovgaluk@ispras.ru
N.I. Fursova - Student of Yaroslav-the-Wise Novgorod State University. E-mail: Natalia.Fursova@ispras.ru
D.S. Dmitriev - Student of Yaroslav-the-Wise Novgorod State University. E-mail: Denis.Dmitriev@ispras.ru
ICS Security control by detecting and fixing vulnerabilities
D.A. Moskvin - Ph.D. (Eng.) Neobit Ltd. E-mail: moskvin@neo-bit.ru
Topical issues of identifying vulnerabilities and undeclared capabilities in software

A.V. Barabanov – Ph.D.(Eng.), Deputy General Director of NPO «Echelon» (Moscow)

E-mail: a.barabanov@npo-echelon.ru

A.S. Markov – Dr.Sc.(Eng.), President of NPO «Echelon» (Moscow)

E-mail: a.markov@npo-echelon.ru

V.L. Tsirlov – Ph.D.(Eng.), General Director of NPO «Echelon» (Moscow) E-mail: v.tsirlov@npo-echelon.ru