Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Anatoly P. Durakovskiy"'
Publikováno v:
Безопасность информационных технологий, Vol 29, Iss 4, Pp 42-52 (2022)
When building multi-level information protection both in the public and in the private sector, it is necessary to take the measures aimed at preventing threats to information security. Cyberphysical systems, as a means of communication, are actively
Externí odkaz:
https://doaj.org/article/35dfe55111b44695adb8d2a858936809
Publikováno v:
Безопасность информационных технологий, Vol 29, Iss 2, Pp 20-35 (2022)
The purpose of the paper is to analyze and systematize the existing security threats to the functioning of cyber-physical systems through vulnerabilities of wireless networks operating on the basis of protocols defined by the IEEE 802.11 standard. Th
Externí odkaz:
https://doaj.org/article/7f757b1002654a07917328203c136e5d
Publikováno v:
Безопасность информационных технологий, Vol 29, Iss 1, Pp 108-124 (2022)
The present paper aims to determine possible approaches to the analysis of side electromagnetic radiation (EMR) of the monitor video subsystem with the DisplayPort interface within the framework of the investigation of computer processed information
Externí odkaz:
https://doaj.org/article/18ca68e14bc64382971ef221b36f5820
Publikováno v:
Безопасность информационных технологий, Vol 28, Iss 3, Pp 6-27 (2021)
Today in Russia the active work is going on the implementation of a relatively new mechanism of state regulation in the field of information security, which is legally defined as ensuring the security of significant objects of critical information in
Externí odkaz:
https://doaj.org/article/d0fdab2c5bc24b9d8b1582fd1ae3d9e6
Publikováno v:
Безопасность информационных технологий, Vol 27, Iss 3, Pp 18-25 (2020)
The study is devoted to the problem of counterfeiting electronic devices. The constantly increasing requirements for the characteristics and functionality of electronic components for critical equipment (spacecraft, dual-purpose and special-purpose e
Externí odkaz:
https://doaj.org/article/c33937415b1e4e8aa9f157d3c69781cd
Publikováno v:
Безопасность информационных технологий, Vol 27, Iss 1, Pp 19-27 (2020)
The paper suggests a number of proposals for formation of the regulatory field of protection systems against fraud and counterfeit products, as well as for a uniquely understood set of terms, abbreviations and definitions based on the most harmonized
Externí odkaz:
https://doaj.org/article/070edfbfe7ee460aa380d1b7572fb57a
Publikováno v:
Безопасность информационных технологий, Vol 26, Iss 4, Pp 54-68 (2019)
The development of a new approach to state regulation in the field of information security, called “ensuring the security of critical information infrastructure (CII)” is a certain challenge for the sphere of educational services, associated with
Externí odkaz:
https://doaj.org/article/a3fbfcc14cad47819ccaaa7238b21d98
Publikováno v:
Безопасность информационных технологий, Vol 26, Iss 2, Pp 44-57 (2019)
The aim of this work is to simplify the activities of categorization of critical information infrastructure (CII) for educational organizations engaged in research activities in the framework of the implementation of the adopted legislation. In the f
Externí odkaz:
https://doaj.org/article/845b5abcd05649f695af4de3a9214469
Publikováno v:
Безопасность информационных технологий, Vol 25, Iss 2, Pp 38-53 (2018)
A determination of real attenuation of information signal's radiation on a way from the source to a possible location of intelligence devices is considered to be the most difficult operation while assessing information security against leakage of ele
Externí odkaz:
https://doaj.org/article/18a7b282f93c4917a358c1dd44094c92
Autor:
Egor A. Simakhin, Danil A. Shinyaev, Igor I. Kagin, Leonid N. Kessarinskiy, Anatoly P. Durakovskiy
Publikováno v:
2022 Moscow Workshop on Electronic and Networking Technologies (MWENT).