-
1
Model for assessing the effectiveness of information security systems
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
2
Computational methods and technical means of processing signals of side electromagnetic emanation
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
3
PLENARY SESSIONS OF THE RUSSIAN MICROELECTRONICS 2024 FORUM. PART 1
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
4
The influence of an impulsed ion radiation on the sensitivity parameters of integrated circuits to single event effects
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
5
An ensemble of modern computer vision models for deepfake detection
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
6
Functional modeling of formalization malware implementation tactics
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
7
Single event effects radiation testing requirements: a minimax approach
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
8
Feasibility Analysis of Using X-ray Inspection Systems for Assessing the Mass Thickness of Integrated Circuit Packages
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
9
THE SECOND ALL-RUSSIAN SCIENTIFIC AND TECHNICAL CONFERENCE "CYBERNETICS AND INFORMATION SECURITY"
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
10
EDITOR-IN-CHIEF'S COLUMN
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
11
Special embedded software of trusted electronic component
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
12
Information security threats of optimizing compilers’ plugins
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
13
Acceleration of modular arithmetic in post-quantum signature schemes
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
14
ELECTRONICS OF INDIA
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
15
Pseudorandom number generators with self-monitoring of correct operation
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article -
16
An approach to predicting the properties of software vulnerabilities
Published 2024-11-01“…Безопасность информационных технологий…”
Get full text
Article