Bezopasnost informacionnyh tehnology最新文献

筛选
英文 中文
Using Neural Networks to Create and Test Pseudorandom Number Generators 使用神经网络创建和测试伪随机数生成器
Bezopasnost informacionnyh tehnology Pub Date : 2023-12-01 DOI: 10.26583/bit.2023.4.04
Alexey M. Bulygin, I. Chugunkov
{"title":"Using Neural Networks to Create and Test Pseudorandom Number Generators","authors":"Alexey M. Bulygin, I. Chugunkov","doi":"10.26583/bit.2023.4.04","DOIUrl":"https://doi.org/10.26583/bit.2023.4.04","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":" 46","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138616772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of machine vision technology for focused laser effect accuracy improvement in microelectronic structures research and semiconductor microprocessing 在微电子结构研究和半导体微处理中应用机器视觉技术提高聚焦激光效应精度
Bezopasnost informacionnyh tehnology Pub Date : 2023-12-01 DOI: 10.26583/bit.2023.4.10
R. Mozhaev, A. A. Pechenkin, Artem A. Tsirkov, Kirill G. Belozerov, V. P. Lukashin, A. A. Baluev
{"title":"Application of machine vision technology for focused laser effect accuracy improvement in microelectronic structures research and semiconductor microprocessing","authors":"R. Mozhaev, A. A. Pechenkin, Artem A. Tsirkov, Kirill G. Belozerov, V. P. Lukashin, A. A. Baluev","doi":"10.26583/bit.2023.4.10","DOIUrl":"https://doi.org/10.26583/bit.2023.4.10","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"359 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138625703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodological and implementation aspects of introducing secure software development processes 引入安全软件开发过程的方法和实现方面
Bezopasnost informacionnyh tehnology Pub Date : 2023-05-01 DOI: 10.26583/bit.2023.2.01
S. S. Arustamyan, Vitaly V. Varenitca, A. Markov
{"title":"Methodological and implementation aspects of introducing secure software development processes","authors":"S. S. Arustamyan, Vitaly V. Varenitca, A. Markov","doi":"10.26583/bit.2023.2.01","DOIUrl":"https://doi.org/10.26583/bit.2023.2.01","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123369536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of the parameters of a physically unclonable arbiter-type function based on FPGA 基于FPGA的物理不可克隆仲裁函数参数研究
Bezopasnost informacionnyh tehnology Pub Date : 2023-05-01 DOI: 10.26583/bit.2023.2.10
D.A Kozin, P. V. Nekrasov, Ilya A. Mityakov, Nikita S. Pinchuk
{"title":"Investigation of the parameters of a physically unclonable arbiter-type function based on FPGA","authors":"D.A Kozin, P. V. Nekrasov, Ilya A. Mityakov, Nikita S. Pinchuk","doi":"10.26583/bit.2023.2.10","DOIUrl":"https://doi.org/10.26583/bit.2023.2.10","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114863333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of the possibility of creating a communication channel by means of Skype 通过Skype创建通信通道的可能性的调查
Bezopasnost informacionnyh tehnology Pub Date : 2023-05-01 DOI: 10.26583/bit.2023.2.07
V. Shurygin, I. M. Yadykin
{"title":"Investigation of the possibility of creating a communication channel by means of Skype","authors":"V. Shurygin, I. M. Yadykin","doi":"10.26583/bit.2023.2.07","DOIUrl":"https://doi.org/10.26583/bit.2023.2.07","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116322537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainability of technological processes in the aspect of security of critical information infrastructure 关键信息基础设施安全方面的技术过程的可持续性
Bezopasnost informacionnyh tehnology Pub Date : 2023-05-01 DOI: 10.26583/bit.2023.2.02
Grigory P. Gavdan, Alexander N. Vavichkin, V. G. Ivanenko, Yulia D. Kuleshova, Elina P. Rybalko
{"title":"Sustainability of technological processes in the aspect of security of critical information infrastructure","authors":"Grigory P. Gavdan, Alexander N. Vavichkin, V. G. Ivanenko, Yulia D. Kuleshova, Elina P. Rybalko","doi":"10.26583/bit.2023.2.02","DOIUrl":"https://doi.org/10.26583/bit.2023.2.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116490145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Features of the software architecture of the PLIF language platform for the analysis of the security of information flows in automated systems PLIF语言平台的软件架构特点,用于分析自动化系统中信息流的安全性
Bezopasnost informacionnyh tehnology Pub Date : 2023-05-01 DOI: 10.26583/bit.2023.2.03
Aleksei A. Timakov, Mikhail M. Fadeev, Ilya G. Ryzhov, A. V. Lysikov
{"title":"Features of the software architecture of the PLIF language platform for the analysis of the security of information flows in automated systems","authors":"Aleksei A. Timakov, Mikhail M. Fadeev, Ilya G. Ryzhov, A. V. Lysikov","doi":"10.26583/bit.2023.2.03","DOIUrl":"https://doi.org/10.26583/bit.2023.2.03","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133912109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the informativeness of the extreme octave bands of the speech frequency range 语音频率范围极值倍频带的信息量
Bezopasnost informacionnyh tehnology Pub Date : 2023-05-01 DOI: 10.26583/bit.2023.2.06
Sergei B. Kozlachkov, S. Dvoryankin, Andrew M. Bonch-Bruevich, Nadezhda V. Vasilevskaya
{"title":"On the informativeness of the extreme octave bands of the speech frequency range","authors":"Sergei B. Kozlachkov, S. Dvoryankin, Andrew M. Bonch-Bruevich, Nadezhda V. Vasilevskaya","doi":"10.26583/bit.2023.2.06","DOIUrl":"https://doi.org/10.26583/bit.2023.2.06","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117254443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approaches to detection of malware using custom network protocols 使用自定义网络协议检测恶意软件的方法
Bezopasnost informacionnyh tehnology Pub Date : 2023-05-01 DOI: 10.26583/bit.2023.2.05
Alexander I. Mukhamedov
{"title":"Approaches to detection of malware using custom network protocols","authors":"Alexander I. Mukhamedov","doi":"10.26583/bit.2023.2.05","DOIUrl":"https://doi.org/10.26583/bit.2023.2.05","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115733924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Steganographic embedding of information in SVG images on a WEB page 在网页上的SVG图像中嵌入信息的隐写术
Bezopasnost informacionnyh tehnology Pub Date : 2023-05-01 DOI: 10.26583/bit.2023.2.08
S. Belim, S. N. Munko
{"title":"Steganographic embedding of information in SVG images on a WEB page","authors":"S. Belim, S. N. Munko","doi":"10.26583/bit.2023.2.08","DOIUrl":"https://doi.org/10.26583/bit.2023.2.08","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128695540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信