№8 (85), August 2008.

SECTION I. SECURITY OF COMPLEX FACILITIES
Vasilyev V.I., Pestrikov V.A., Krasko A.S. INTELLIGENCE DECISION MAKING SUPPORT IN EXTREME CASE BASED ON CASE-BASED REASONING INFOSPHERE
Radko S.A., Lepeshkin O.M. DEVELOPMENT OF THE METHODOLOGICAL APPROACH OF WORKING OUT OF FUNCTIONALLY -DISCRETIONARY OF THE SOCIO-TECHNICAL INFORMATIONAL SYSTEMS ON THE BASIS OF THE ENVIRONMENT OF RADICALS
Guzairov M.B., Mashkina I.V., Tukhvatshin T.H. DEVELOPMENT OF DECISION-MAKING MODELS ON INFORMATION SECURITY OPERATIVE MANAGEMENT BASED ON ATTACK PROBABILITY NUMERICAL EVALUATION
Tenetko M., Peskova O. THE CONCEPT OF INFORMATION RISKS ESTIMATION ON THE BASIS OF INDISTINCT SETS
Arkov P. COMPLEX OF MODELS FOR OPTIMAL SECURITY SYSTEM PROJECT SEARCHING
Danilyuk S. G., Maslov V. G. SUBSTANTIATION FOR UNCERTAIN CONDITIONAL APPROACH TO THE CONSTRUCTION OF THE MODEL OF INFORMATION PROTECTION SYSTEM WITH THE USE OF FALSE IN- FORMATION OBJECTS
Putivcev М.Е. INFORMATION SECURITY CONTROL SYSTEM ANALYSIS BY USING PROCESS MANAGEMENT
Mashkina I.V., Aleksa S.N. DEVELOPMENT OF NUMERICAL RISK ASSESSMENT METHOD AND FUNCTIONAL MODEL ON THE PROBABILISTIC-STATIC APPROACH BASIS
SECTION II. SECURITY OF INFORMATION SYSTEMS AND NETWORKS
Borodakij J.V., Dobrodeev A.J., Palchun B.P., Boldina M.N. INSIDEROLOGY – A SCIENCE ABOUT ILLEGITIMATE (UNLAWFUL ACTS) IN COMPUTER INFOSPHERE
Smirnov S.N. QUEUING MODELS TO OBTAIN CHARACTERISTICS OF AVAILABILITY
Rosenko A. P. MATHEMATICAL MODELING OF INTERNAL THREATS ON SAFETY OF THE CONFIDENTIAL INFORMATION CIRCULATING IN AUTOMATED INFORMATION SYSTEM AVAILABILITY
Yzov U. K., Grigoreva T. V. PARADIGM OF THE CRITICAL DAMAGE AND USE IT AT THE ASSESSMENT RISKS OF INFORMATION SECURITY VIOLATION IN COMPUTER SYSTEM
Zolotarev V. V. RESEARCH METHOD OF INFORMATION SOFTWARE PROTECTION ON OPERATIONAL ENVIRONMENT COMPONENTAL MODEL
Tsybulin A.M., Nikishova A.V., Umnitsyn M.G. INVESTIGATION OF INFORMATION SYSTEM’S SECURITY SERVICE AND A QUANTITY OF ATTACKERS’ OPPOSITION
Arkhipochkin E.V. PECULIARITIES AND PROPERTIES OF THE RESIDENT SECURITY COMPONENT FOR INTEGRITY PROVIDING SYSTEM OF COMPUTER BASED SYSTEMS
Verba V.S., Mikheev V.A. SYSTEM ANALYSIS OF DESIGN AND MULTIPURPOSE INFORMATION SYSTEM METHODS
Bondarev A.A., Chernyshov A.C. ACCESS DELIMITATION AND HTTP SERVER APACHE WITH THE PREVENTIVE PROTECTION MODULE ADJACENT CHILD PROCESSES ISOLATION SYSTEM DEVELOPMENT
Tumoyan E. P. PROBABILISTIC AUTOMATA BASED COMPUTER ATTACK MODELING APPROACH
Abramov E. S., Mordvin D. V. PARALLEL ALGORITHM FOR GENERAL NUMBER FIELD SIEVE DISCRETE LOG METHOD
Nesterenko V.A CONSTRUCTION AND USE OF FUNCTION OF DENSITY IN SPACE OF CHARACTERISTICS FOR DETECTION OF ABNORMAL EVENTS
Gorkovenko Y. USING OF NON-TRADITIONAL CRYPTOGRAPHIC TRANSFORMATIONS IN INFORMATIONAL SYSTEMS WITH MANDATE POLICY OF CONTROL ACCESS
Rublev D.P., Fedorov V.M., Chumachenko A.B., Makarevich O.B. AFFILIATION BASED ON DIGITAL IMAGE NON-UNIFORMITY
Bryukhomitsky, Yu. A. CLASSIFICATION OF NON-STATIONARY PROBABILISTIC PERSONAL BIOMETRIC PARAMETERS
Gonnov V.V. ELABORATION OF METHODS, PROTOCOLS AND ALGORITHMS OF PROTECTION OF UPPER-LEVEL DATA TRANSMISSION IN SYSTEMS OF «INTELLECTUAL BUILDING»
Shpielevoy D.I. REGULATION OF ACCESS TO THE DATA IN DATABASE ORACLE
Mikheev V.A. BASIS IN CONSTRUCTION OF SUBSYSTEM FOR PROTECTION OF MULTIPURPOSE INFORMATION SYSTEM
Fedorov V.M. PERSONAL IDENTIFICATION BASED ON SOUND PROPAGATION THROUGH BONE TISSUE
Belyi A.F. COMPUTER GAMES FOR A CHOICE OF METHODS AND MEANS OF PROTECTION OF THE INFORMATION IN THE AUTOMATED SYSTEMS
SECTION III. SECURITY OF TELECOMMUNICATIONS
Lednov D. A., Kulay A. Yu., Melnikov S. Yu. ABOUT STATISTIC METHODS OF CORRUPTED TEXT AND SPEECH MESSAGES IDENTIFICATION
Khisamov D.F. SYNCHRONIZATION SIMULATION OF THE PSEUDO-RANDOM SEQUENCE ON THE NONINDEPENDENT ERRORS LINKS
Zhuk A.P., Chernyak Z.V., Sazonov V.V., Ivanov A.S. THE SENSE OF ORTHOGONAL SIGNAL ENSEMBLES WITH CHANGEABLE MEASURES IN CDMA SYSTEM
Maevsky A., Pelenitsyn A. IMPLEMENTATION OF PROGRAM ALGEBRAIC-GEOMETRIC CODEC WITH USE OF SAKATA ALGORITHM
SECTION IV. METHODS AND MEANS OF CRYPTOGRAPHY AND STEGANOGRAPHY
Babenko L. K., Sidorov I. D. PARALLEL ALGORITHM FOR GENERAL NUMBER FIELD SIEVE DISCRETE LOG METHOD
Mkrtichan V.V. ON APPLICATION AND EXPERIMENTAL RESEARCH OF RELIABILITY OF THE OF SPECIAL BROADCASTING ENCRYPTION SCHEME
Ischukova E.A. INVESTIGATION OF INFLUENCE OF S-BLOCKS TO STRENGTH OF CRYPTOGRAPHIC ALGORITHMS
SECTION V. TRAINING SPECIALISTS IN THE INFORMATION SAFETY
Kistereva S. N. THE REALIZATION OF THE INTELLECTUAL AND EDUCATIONAL SYSTEM MODEL IN PROFESSIONAL TRAINING OF INFORMATION SECURITY SPECIALISTS
Makarevich O.B. RESEARCH DIRECTIONS OF THE DEPARTMENT OF IT-SECURITY, TTI SFEDU AND THEIR IMPLEMENTATION IN INDUSTRY AND EDUCATION