№2 (151), February 2014.

SECTION I. CONCEPTUAL ISSUES OF INFORMATION SECURITY
V.I. Vasilyev, B.G. Ilyasov, T.A. Ivanova METHODOLOGY OF PROVIDING OF COMPLEX ORGANIZATIONAL SYSTEMS SECURITY ON BASIS OF TRIAD APPROACH
A.Y. Gufan, K.I. Polyushkina CUMULATIVE APPROACH USING PROBABILISTIC METHODS FOR DETECTION INFORMATION SECURITY THREATS
SECTION II. SECURITY OF INFORMATION SYSTEMS AND NETWORKS
E.S. Abramov, M.A. Kobilev, L.S. Kramorov, D.V. Mordvin DESIGN OF COUNTERMEASURES FOR SECURITY RISKS OF ENTERPRISE NETWORKS BY USING ATTACK GRAPHS
A.T. Aliev PROACTIVE MALWARE PROTECTION SYSTEMS
Yu.A. Bryukhomitsky THE IMMUNOLOGIC APPROACH TO KEYBOARD MONITORING ORGANIZATION
E.A. Pakulova SENDER-SIDE PATH-SCHEDULING ALGORITHM FOR VIDEO STREAM ALLOCATION IN HETEROGENEOUS WIRELESS NETWORK
A.A. Beshta, A.M. Tsybulin ALGORITHM OF INSADERS DETECTION BASED ON CONFIDENCE EVALUATION
V.I. Vasilyev, I.V. Sharabyrov LOCAL WIRELESS NETWORKS ATTACKS DETECTION BASED ON INTELLIGENT DATA ANALYSIS
V.M. Fedorov, D.P. Rublev IDENTIFICATION OF TEXT TYPED ON KEYBOARD BY VIBROACOUSTICS NOISES
A.Yu. Oladko, V.S. Atkina MODEL OF ONLINE STORE PROTECTION
A.V. Nikishova, R.F. Rudikov, E.A. Kalinina NEURAL NETWORK ANALYSIS OF SECURITY EVENTS IN INFORMATION SYSTEM
I.Y. Polovko, O.Y. Peskova ANALYSIS OF THE FUNCTIONAL REQUIREMENTS FOR INTRUSION DETECTION SYSTEMS
E.S. Abramov, E.S. Basan, Vijay Laxmi DEVELOPMENT OF SECURE PROTOCOL FOR MOBILE CLUSTER SENSOR NETWORK MANAGMENT
SECTION III. SECURITY OF COMPLEX FACILITIES
E.A. Maksimova, T.A. Omelchenko, V.V. Alekseenko PROBLEMS OF PRIVATE POLICY OF INFORMATION SECURITY OF ENTERPRISE INCIDENTS MANAGEMENT DEVELOPMENT
A.M. Tsybulin, V.A. Baldaev, A.A. Beshta OUTSOURCE AND INFORMATION SECURITY
E.P. Sokolovsky, O.A. Finko INFORMATION SUPPORT OF STOCKPILE MANAGEMENT OF MEANS OF PROTECTION OF INFORMATION IN THE CONDITIONS OF UNCERTAINTY
SECTION IV. METHODS AND MEANS OF CRYPTOGRAPHY AND STEGANOGRAPHY
A.S. Eliseev, A.R. Tikidzhi-Khamburian STATISTICAL STEGANALYSIS OF IMAGES SOURCES, BASED ON OPAQUE SEPARATE IMAGES STEGANALYSIS TECHNIQUE
L.K. Babenko, E.A. Ischukova ANALYSIS OF ALGORITHM GOST 28147-89: RESEARCH OF WEAK S-BOXES
L.K. Babenko, E.A. Ischukova USING OF WEAK BLOCKS OF REPLACEMENT FOR LINEAR CRYPTOANALYSIS OF BLOCK CIPHERS
A.V. Bessalov, A.A. Dikhtenko, O.V. Tsygankova DENSITY OF THE CANONICAL ELLIPTIC CURVES HAVING A PROPERTY OF THE ISOMORPHISM TO AN EDWARDS FORM
L.K. Babenko, E.A. Maro ALGORITHMS OF RESISTANCE EVALUATION CIPHERS BY ALGEBRAIC CRYPTANALYSIS METHOD
Ju.E. Ryabinin, O.A. Finko STEGANOGRAPHIC SYSTEM RESISTANT TO ATTACK IN THE EXTENDE MODULAR ARITHMETIC
L.K. Babenko, D.A. Bespalov, O.B. Makarevich, R.D. Chesnokov, Y.A. Trubnikov SOFTWARE AND HARDWARE DEVELOPMENT AND RESEARCH OF ENCRYPTION ALGORITHM PRESENT FOR SOLVING PROBLEMS OF THE LIGHTWEIGHT CRYPTOGRAPHY
SECTION V. SECURITY OF TELECOMMUNICATIONS
I.A. Kalmykov, O.V. Velts, M.I. Kalmykov, D.O. Naumenko DEVELOPMENT OF AN ALGORITHM IMITATION RESISTANCE FOR OF REMOTE MONITORING AND CONTROL CRITICAL TECHNOLOGIES
S.V. Kotenko IDENTIFICATION ANALYSIS OF PROCESSES TELECOMMUNICATIONS OF CONTINUOUS REPORTS IN DIGITAL INFORMATION SYSTEMS
V.M. Deundyak, Yu.V. Kosolapov ONE METHOD OF REMOVING THE UNCERTAINTY IN THE CHANNEL WITH ERRORS IN THE CASE OF CODE NOISING
A.F. Chipiga STEALTH ENERGY ANALYSIS OF LOW FREQUENCY SYSTEM OF SATELLITE COMMUNICATIONS FROM SIGNAL DETECTION
SECTION VI. APPLICATIONS OF INFORMATION SECURITY
I.A. Kalmykov, A.B. Sarkisov, A.V. Makarova, M.I. Kalmykov ENHANCED PROTECTION METHODS OF ELECTRONIC COMMERCE ON THE BASIS OF MODULAR ALGEBRAIC SCHEME
L.V. Tolmacheva, E.N. Kamenskaya IMPACT ANALYSIS OF INFORMATION EDUCATIONAL ENVIRONMENT FOR A STUDENT OF A TECHNICAL UNIVERSITY
N.D. Abasov ORGANISATION OF TRANSACTION LOG OLTP-SYSTEM FUNCTIONING IN SURPLUS MODULAR CODE
O.Yu. Peskova, I.Yu. Polovko, S.V. Fateeva REVIEW OF APPROACHES TO THE ORGANIZATION OF ELECTRONIC VOTING
K.A. Katkov, E.K. Katkov IMPROVING THE INFORMATION SECURITY OF THE SATELLITE RADIO NAVIGATION SYSTEMS WITH ARTIFICIAL IONOSPHERIC DISTURBANCES