{"title":"Using Neural Networks to Create and Test Pseudorandom Number Generators","authors":"Alexey M. Bulygin, I. Chugunkov","doi":"10.26583/bit.2023.4.04","DOIUrl":"https://doi.org/10.26583/bit.2023.4.04","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":" 46","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138616772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Mozhaev, A. A. Pechenkin, Artem A. Tsirkov, Kirill G. Belozerov, V. P. Lukashin, A. A. Baluev
{"title":"Application of machine vision technology for focused laser effect accuracy improvement in microelectronic structures research and semiconductor microprocessing","authors":"R. Mozhaev, A. A. Pechenkin, Artem A. Tsirkov, Kirill G. Belozerov, V. P. Lukashin, A. A. Baluev","doi":"10.26583/bit.2023.4.10","DOIUrl":"https://doi.org/10.26583/bit.2023.4.10","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"359 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138625703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodological and implementation aspects of introducing secure software development processes","authors":"S. S. Arustamyan, Vitaly V. Varenitca, A. Markov","doi":"10.26583/bit.2023.2.01","DOIUrl":"https://doi.org/10.26583/bit.2023.2.01","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123369536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D.A Kozin, P. V. Nekrasov, Ilya A. Mityakov, Nikita S. Pinchuk
{"title":"Investigation of the parameters of a physically unclonable arbiter-type function based on FPGA","authors":"D.A Kozin, P. V. Nekrasov, Ilya A. Mityakov, Nikita S. Pinchuk","doi":"10.26583/bit.2023.2.10","DOIUrl":"https://doi.org/10.26583/bit.2023.2.10","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114863333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of the possibility of creating a communication channel by means of Skype","authors":"V. Shurygin, I. M. Yadykin","doi":"10.26583/bit.2023.2.07","DOIUrl":"https://doi.org/10.26583/bit.2023.2.07","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116322537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Grigory P. Gavdan, Alexander N. Vavichkin, V. G. Ivanenko, Yulia D. Kuleshova, Elina P. Rybalko
{"title":"Sustainability of technological processes in the aspect of security of critical information infrastructure","authors":"Grigory P. Gavdan, Alexander N. Vavichkin, V. G. Ivanenko, Yulia D. Kuleshova, Elina P. Rybalko","doi":"10.26583/bit.2023.2.02","DOIUrl":"https://doi.org/10.26583/bit.2023.2.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116490145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aleksei A. Timakov, Mikhail M. Fadeev, Ilya G. Ryzhov, A. V. Lysikov
{"title":"Features of the software architecture of the PLIF language platform for the analysis of the security of information flows in automated systems","authors":"Aleksei A. Timakov, Mikhail M. Fadeev, Ilya G. Ryzhov, A. V. Lysikov","doi":"10.26583/bit.2023.2.03","DOIUrl":"https://doi.org/10.26583/bit.2023.2.03","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133912109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sergei B. Kozlachkov, S. Dvoryankin, Andrew M. Bonch-Bruevich, Nadezhda V. Vasilevskaya
{"title":"On the informativeness of the extreme octave bands of the speech frequency range","authors":"Sergei B. Kozlachkov, S. Dvoryankin, Andrew M. Bonch-Bruevich, Nadezhda V. Vasilevskaya","doi":"10.26583/bit.2023.2.06","DOIUrl":"https://doi.org/10.26583/bit.2023.2.06","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117254443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approaches to detection of malware using custom network protocols","authors":"Alexander I. Mukhamedov","doi":"10.26583/bit.2023.2.05","DOIUrl":"https://doi.org/10.26583/bit.2023.2.05","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115733924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganographic embedding of information in SVG images on a WEB page","authors":"S. Belim, S. N. Munko","doi":"10.26583/bit.2023.2.08","DOIUrl":"https://doi.org/10.26583/bit.2023.2.08","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128695540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}