№11 (100), November 2009.

SECTION I. SECURITY OF COMPLEX FACILITIES
D.А. Astakhov INFORMATION ARMS RACE INHIBITION PROBLEM'S SOLUTION IN TERMS OF RISK PSYCHOLOGY
V.V. Bratash, M.А. Kamanin INFORMATION SYSTEM FOR MONITORING OF DISTRIBUTION OF TEMPERATURE INDOORS WITH THE RAISED FIRE DANGER AND EXPLOSION HAZARD
O.M. Lepeshkin METHOD OF FUNCTIONAL-DISCRETIONARY MODEL REALIZATION ON THE BASIS OF RADICALS
V.A. Mikheev SYSTEM ANALYSIS OF METHODS TO PROVIDE AND INCREASE RELIABILITY OF MULTIFUNCTIONAL INFORMATION SYSTEM
I.I. Markovich, V.U. Doroshenko ANALYSIS OF ALGORITHMS DETECT ION BIOLOGICAL OBJECT AFTER OBSTACLES OF ULTRA BANDWIDTH RADAR
V.A. Mikheev METHODS TO SELECT EFFICIENT HARDWARE-SOFTWARE SYSTEM FOR INFORMATION PROTECTION OF MULTIFUNCTIONAL INFORMATION SYSTEM
G.A. Evstafiev FUZZY COGNITIVE MAPS IN RELATION TO RISK MANAGEMENT INFORMATION SECURITY
O.M. Lepeshkin, P.V. Kharechkin FUNCTIONAL-ROLE-BASED ACCESS CONTROL MODEL IN SOCIOTECHNICAL SYSTEMS
SECTION II. SECURITY OF INFORMATION SYSTEMS AND NETWORKS
P.M. Pristalov, A.S. Afanasiev DEVELOPMENT OF SECURITY REQUIREMENTS FOR REMOTE TESTING SYSTEM
A.V. Blagodarenko SCHEME FOR HARMFUL NETWORK DATA DETECTION WITH EXECUTABLE CODE DYNAMIC ANALYSIS
S.D. Zhilkin DIVIDING THE SOFTWARE'S PERFORMANCE INTO WORK PHASES FOR BUILDING BEHAVIOR MODELS
G.V. Karaychev ANOMALY DETECTION BASED ON ADAPTIVE GRID-BASED ALGORITHM
E.A. Pakulova THE MODEL OF MODERN MONITORING SYSTEM OF MOBILE OBJECTS WITH ASSURED DELIVERY OF MESSAGES IN HETEROGENEOUS WIRELESS NETWORK
E.S. Abramov DEVELOPMENT OF ADAPTIVE SYSTEM OF INFORMATION SECURITY
I.Y. Polovko METHODS OF TESTING THE EFFECTIVENESS OF NETWORK INTRUSION DETECTION SYSTEMS
K.I. Emelianov IMPLEMENTATION OF THE ATTACK ON THE PROTOCOL WPA2
M.I. Tenetko, O.U. Peskova ANALYSIS AND RISK ASSESSMENT INFORMATION USING FUZZY SEMANTIC WEB
Yu. A. Bryukhomitsky CHAIN METHOD OF KEYBOARD MONITORING
Yu. A. Bryukhomitsky STATISTICAL METHODS OF KEYSTROKE DYNAMICS ECOGNITION
G.E. Abramov MODEL OF THE ANOMALOUS BEHAVIOR OF THE SYSTEM BASED ON PROBABILISTIC SUFFIX TREES
E.S. Abramov, I.D. Sidorov METHOD OF DETECTION OF DISTRIBUTED INFORMATION IMPACTS ON THE BASIS OF HYBRID NEURAL NETWORK
A.P. Rosenko ONE APPROACH TO DETERMINING CONSEQUENCES PROBABILITIES OF EXPOSURE TO AIS INFORMATION SECURITY THREATS
A.P. Rosenko APPLICATION OF MARKOV RANDOM PROCESS WITH DISCRETE PARAMETERS FOR ASSESSING OF INFORMATION SECURITY LEVEL
A.F. Chipiga, A.A. Ereshenko, V.S. Peleshenko MODEL OF THREE-DIMENSIONAL STRUCTURE OF OBJECTS ACCESS MATRIX
О.P. Malofei, L.А. Fomin, V.V. Radionov, S.A. Ryadnov SELFSIMILAR TRAFFIC MODEL ANALYSIS IN NGN NETS FORMATION
SECTION III. METHODS AND MEANS OF CRYPTOGRAPHY AND STEGANOGRAPHY
L.K. Babenko, E.A. Maro АLGEBRAIC CRYPTANALYSIS OF SIMPLIFIED RIJNDAEL ALGORITHM
D.P. Rublev, O.B. Makarevich, V.М. Fedorov STEGANOGRAPHICAL METHOD FOR MESSAGES EMBEDDING TO AUDIODATA BASED ON THE WAVELET-TRANSFORM
A.F. Chipiga THE APPROACH TO THE DATA RETENTION PROBLEM WITH DECRYPTION KEY DISCLOSING AT THE RECEIVING SIDE
I.A. Kalmikov, A.А. Chipiga, A.V. Baril’skaya, O.A.Kikhtenko CRYPTOGRAPHIC PROTECTION OF DATA IN INFORMATION TECHNOLOGY ON BASE NEPOZICIONNYH POLYNOMIAL SYSTEMS
L.K. Babenko, E.A. Ischukova MAIN FEATURES OF DIFFERENTIAL CRYPTANALYSIS OF BLOCK CIPHERS
L.K. Babenko, E.A. Ischukova DIFFERENTIAL CRYPTANALYSIS OF STREAM CIPHERS
SECTION IV. SECURITY OF TELECOMMUNICATIONS
A.A. Fedchun METHODS OF RECEIVING RADIO SIGNALS IN THE PROTECTED TELECOMMUNICATION SYSTEMS
A.A. Fedchun FORMING OF SIGNALS FOR THE PROTECTED TELECOMMUNICATION RADIO SYSTEM