main page
archive:
Advertisment:
Grant ME RF
“ќ2-03.1-816
язык\language

–усский | English

journal

є1

about journal

themes

Write us:

fibres@pbox.infotecstt.ru

fibres@itt.net.ru

2003 year, є1

I. Philosophical, historical, spiritual, legal aspects of the nature of terrorism and information scrambling with it.

  1. Kotenko V.V., Rumjantsev K.E. TRANSFORMATION OF TERRORISM THREATS IN INFORMATION SECURITY BREAKDOWN CIRCUMSTANCES
  2. Kotenko V.V., Rumjantsev K.E., Polikarpov S.V. CONCEPTION OF MODERN INFORMATION THEORY BUILDING STRATEGY.
  3. Lunev A.A. TERRORISM AS KIND OF ARMED VIOLENCE.
  4. Potanin A.V. SERIAL KILLS AS ONE OF THE SOCIAL TERRORISM MANIFESTATION.
  5. Shpakov A.E. SOME QUESTIONS OF PROSTITUTION COUNTERACTIONS IN TERRORISM THREAT CIRCUMSTANCES.

II. Information technologies of safety control of the personality, company, state

  1. Kotenko V.V., Rumjantsev K.E., Polikarpov S.V. COMPUTER TECHNOLOGIES: WAY OF USE WHILE SOLVING TASKS OF AUDIO INFORMATION PROTECTION CURRENT ESTIMATION.
.
  2. Babenko L.K., Bruchkomitsky U.A., Makarevitch O.B., Peskova O.U. RESEARCHES AND EXPLORATIONS IN THE FIELD OF INFORMATION SECURITY.
  3. Bruchkomitsky U.A. INFORMATION SYSTEMS: BIOMETRICAL PARAMETRIC USERS AUTHENTICATION METHOD.
  4. Kotenko V.V., Rumjantsev K.E., Polikarpov S.V. VIRTUAL ESTIMATION IN ANALOG INFORMATION PROTECTION TASKS.
  5. Kotenko V.V., Polikarpov S.V. EVALUATION ALGORITHMS OF VIRTUAL ESTIMATION SYNTHESIS POLICY.

III. Information safety of intellectual systems

  1. Kotenko V.V., Rumjantsev K.E., Polikarpov S.V. INTELLECTUAL SYSTEMS INFORMATIONAL SECURITY FROM THE POSITION OF VIRTUAL KNOWLEDGE.
  2. Kotenko V.V., Rumjantsev K.E., Polikarpov S.V. STRATEGY OF INTELLECTUAL SYSTEMS MODELING.

IV. Guard of intellectual management systems.

  1. Kotenko V.V., Rumjantsev K.E. AUDIO INFORMATION SECURITY EFFICIENCY ESTIMATION CONTROL PROBLEMS.
  2. Kotenko V.V., Rumjantsev K.E., Polikarpov S.V. EFFICIENCY ESTIMATION OF AUDIO INFORMATION SECURITY: SOLVING STRATEGY.
  3. Kotenko V.V., Polikarpov S.V. BASE CONCEPTS AND DEFINITIONS SYSTEMATIZATION IN AUDIO INFORMATION PROTECTION TASKS.

V. Guard of telecommunication systems and time-sharings.

  1. Rumjantsev K.E., Hairov I.E. CONFIDENTIAL INFORMATION TRANSFER BY FIBER-OPTICS CHANNELS, PROTECTED FROM UNAUTHORIZED ACCESS.
  2. Kotenko V.V., Rumjantsev K.E., Polikarpov S.V. CEASELESS SOURCES CODING STRATEGY.
  3. Kotenko V.V., Rumjantsev K.E., Polikarpov S.V. CEASELESS SOURCES CODING THEOREM FROM THE SIDE OF RELATIVE SUPERFLUITY.
  4. Kotenko V.V., Polikarpov S.V. INFORMATION PROTECTION STRATEGY WHILE CODING THE SOURCE.
  5. Kotenko V.V., Polikarpov S.V. NEW WAY TO INFORMATION SECURITY EFFICIENCY ESTIMATION

VI. Radio electronic technologies of information safety.

  1. Wolfovsky B.N. MULTIPLE ANTICORRELATION HANDLING AND ITS POSSIBILITIES TO THE DETECTION OF HARMONIC SIGNAL IN NOISE AND SIGNAL MIXTURE.
  2. Zemlianuchin P.A, Rumjantsev K.E. THE WAYS OF ACTIVE ANALYSIS OF A GAS ENVIRONMENTS IN TERRORISM THREATS CIRCUMSTANCES.

VII. Software of computing systems, complexes and computer networks.

  1. P.P. Kravchenko, N.S. Husainov, A.A. Hadchinov, K.V. Pogorelov, A.N. Shkurko. VIDEO-MONITORING AUDIO AND VIDEO INFORMATION MULTILATERAL CHANGE SOFTWARE SYSTEM.
  2. V.ќ. Osypan THE PROTECTIVE SYSTEM of the INFORMATION ON THE BASIS OF a WARSHAMOV CODE

VIII. Organization and training methodologies of the experts in range of information safety.

  1. Kotenko V.V., Rumjantsev K.E., Polikarpov S.V. NEW WAY TO EDUCATION QUALITY QUANTITATIVE ESTIMATION FORMATION FROM THE SIDE OF VIRTUAL KNOWLEDGE THEORY.


 

Хостинг от uCoz