Information Processing Systems

digest of scientific works

Year of publication:
2010

Issue:
3(84)

# Title Authors Pages
1. Title
2. Contents 178-179
3. Methods of finding defects in structures M.M. Borzov 2-4
4. Choice of method of ranging of sensitiveness for the informative system of higher educational establishment O.O. Budik 5-7
5. Person identification perspective technologies in secure enterprise communication networks research and analyses I.R. Garasym, T.B. Kret 7-10
6. SECURE CORPORATE WIRELESS NETWORKS RESEARCH AND ANALYSIS. WEP PROTOCOL IMPROVEMENT I.R. Garasym, P.A. Pulya 11-13
7. Effect of acoustical fluctuations elastic media information on the contents reflected laser beam I.O. Gromyko, V.Ya. Pevnev, M.M. Borzov 14-16
8. Software for cryptographic operations on hyperelliptic curves V.I. Dolgov, G.V. Nelasa 17-19
9. Technical intelligence and technical channels of leak information S.L. Emelyanov 20-23
10. Measures of costs of risk and their application to optimization of investments in systems of defence Ya.V. Dudykevich, I.A. Prokopishin 24-27
11. Uses programs of remote administration for unauthorized access to information resources V.V. Kalchenko, M.V. Tsuranov 27-30
12. Safety of decision-making game strategies in multiagent systems P.A. Kravets 31-34
13. The security assurance evaluation on the basis of application of linguistic variables O.V. Potij, D.S. Komin 34-37
14. Control content systems and safety of web-sites O.F. Lanovoy, I.V. Kobzev, S.V. Kalyakin 38-41
15. Security increasing by means of wideband phase-manipulated signals application N.P. Lavlinskiy, N.I. Gallini 42-47
16. APPLICATION OF ANALYSIS OF FUR'E IS IN DIGICOM A.S. Petrov, O.S. Zvereva 47-49
17. Analysis of safety of business-applications I.D. Medvedovskiy, A.M. Polyakov 50-53
18. Security metrics classification A.V. Potiy, D.J. Pilipenko 53-56
19. Criteria and indexes of economic security of enterprise E.А. Minina 57-61
20. Mathematical model of information security V.Ya. Pevnev, M.V. Tsuranov 62-64
21. A model of analysis of threats informative safety is in computer network A.S. Petrov, A.V. Borodulin, A.V. Minin 65-67
22. Methods of defence of programmatic code A.S. Petrov, A.A. Petrov 68-71
23. Prospects of application of artificial networks of neurons are in computer systems A.S. Petrov, A.P. Ukrainskiy 72-74
24. Use of nonlinear stochastic differential systems for defence of linguistic signals S.B. Prikhod'ko 75-76
25. THE IMPORTANCE OF THE INFORMATION SECURITY PROBLEM IN UKRAINE AND THE WAYS OF ITS SOLUTION M.V. Savruk 77-79
26. High-performance algorithms for correction of independent errors in cyclic codes V.P. Semerenko 80-86
27. Methods of education intellectual agent in system of preventive active protection to information I.B. Tregubenko 87-89
28. Using wavelet transforms for group anonymity providing of data Chertov O.R. 90-95
29. Computing a consistent conjectural equilibrium in a mixed oligopoly V. V. Kalashnikov, N. I. Kalashnykova 119
30. Providing security for e-business in the republic of Moldova S. Ohrimenco, S. Tutunaru, K. Sclifos 143-144
31. Authors 175-177
32. Index 180

Whoops, looks like something went wrong.