Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Vladislav Romanovich Petrov"'
Autor:
Dmitry Anatolevich Melnikov, Vladislav Romanovich Petrov, Evgeny Vasilevich Dirienko, Anton Anatolevich Abramov, Ivan Alexandrovich Korsakov, Stanislav Sergeevich Kuzminov
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 4, Pp 71-76 (2013)
This paper proposes attacks on the network synchronization systems counteraction technique, method, algorithm and realizable aspects. The network synchronization systems are included in information technology systems or networks. This method is imple
Externí odkaz:
https://doaj.org/article/477baa4f95614a1a8feb4b1587fb1102
Autor:
Dmitry Anatolevich Melnikov, Vladislav Romanovich Petrov, Aleksey Nikolaevich Radko, Denis Sergeevich Buryy, Sergey Alexandrovich Khrustalev
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 4, Pp 83-87 (2013)
This paper proposes traffic analysis procedure that is very effective and sometimes single countermeasure on counteracting of network attacks and information leakage channels (hidden control channels). Traffic analysis envisages certain measures to c
Externí odkaz:
https://doaj.org/article/27464bb67bde4c7da03534e0079c900d
Autor:
Dmitry Anatolevich Melnikov, Vladislav Romanovich Petrov, Evgeny Vasilevich Dirienko, Anton Anatolevich Abramov, Ivan Alexandrovich Korsakov, Stanislav Sergeevich Kuzminov
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 4, Pp 77-82 (2013)
This paper proposes cryptanalysis attacks on network time (synchronization) systems method (computer espionage) based on timestamp fractional value falsification that software’s implant realizes. For massive time stamps using in a public key infras
Externí odkaz:
https://doaj.org/article/5d24052d0e2848e2930af141458bb08f
Autor:
Anatoliy Petrovich Durakovskiy, Tatayna Aleksandrovna Kondratieva, Yuri Nikolaevich Lavrukhin, Vladislav Romanovich Petrov
Publikováno v:
Безопасность информационных технологий, Vol 22, Iss 1 (2015)
The article describes the main types of software used for the study of the code, the shortcomings of existing systems of protection programs and proposed a new model of protection system of code.
Externí odkaz:
https://doaj.org/article/272baefe5df241ab80e5238ee92dc4de
Publikováno v:
Безопасность информационных технологий, Vol 21, Iss 3 (2014)
The article focuses on the role of translation in teaching foreign languages to non-linguistic students and postgraduates. The translation is a way of intercultural communication. At present, the translation is not only a means of teaching and contro
Externí odkaz:
https://doaj.org/article/cefa21ac55c143dfa6fc4411db1de4ca
Publikováno v:
Безопасность информационных технологий, Vol 21, Iss 2 (2014)
The strategy of forming a competitive linguistic space dictates a necessity to use modern IT and means of distance learning while teaching foreign languages to postgraduates of non-linguistics higher learning institutions. The problems of designing,
Externí odkaz:
https://doaj.org/article/4902669afccc42c4a9f665293e99beeb
Autor:
Victor Sergeevich Gorbatov, Sergey Vladimirovich Dvoryankin, Anatoly Petrovich Durakovskiy, Vladislav Romanovich Petrov
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 3, Pp 104-105 (2013)
The aim of this paper is to research ways to use a trusted communications session in E-learning systems for the objective confidence in the results of training.
Externí odkaz:
https://doaj.org/article/dc1203f9fed543af9e4d3b8959935dc7
Publikováno v:
Безопасность информационных технологий, Vol 20, Iss 1, Pp 94-95 (2013)
The aim of this paper is to research the characteristics of the recognition of the users in E-learning systems and to explain the use of the combined method on basis of the known means of identification and authentication.
Externí odkaz:
https://doaj.org/article/db16110f6e544960a93f6b2729551adb