Journals
Books
Articles by keyword Cybersecurity
Heterogeneous architecture of mass calculations and new threats of cybersecurity
A.Е. Baranovich, S.A. Zheltov
Approach to fuzzing testing of network interfaces of Linux family operating systems using hardware virtualization technology

N.N. Samarin, N.D. Krotov

Features of systems implementing data intensive domains as objects for ensuring information security using the example of automated control systems for agrotechnological processes

V.I. Budzko1, V.G. Belenkov2, V.I. Medennikov3, V.I. Korolev4, P.A. Keyer5

1–5 FRC CSC RAS (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru, 3 dommed@mail.ru, 4 vkorolev@ipiran.ru, 5 pkeyer@ipiran.ru