Vol. 50, No. 8, 2016
A simultaneous English language translation of this journal is available from Pleiades Publishing, Ltd.
Distributed worldwide by Springer. Automatic Control and Computer Sciences ISSN 0146-4116.
Management of Information Security Risks in a Context of Uncertainty
p. 657 abstract
Access Control System for Distributed Computing Networks
p. 664 abstract
Tasks of Providing Information Security in Distributed Computing Networks
p. 669 abstract
An Approach to Developing the SIEM System for the Internet of Things
p. 673 abstract
A Prototype Computer with Non-von Neumann Architecture Based on Strategic Domestic J7 Microprocessor
p. 682 abstract
Token Scanning as a New Scientific Approach in the Creation of Protected Systems: A New Generation OS MICROTEK
p. 687 abstract
Development of Automated System for Identifying Abnormal Network Activity and Detecting Threats
p. 693 abstract
Planning of Aggregation and Normalization of Data from the Internet of Things for Processing on a Multiprocessor Cluster
p. 703 abstract
Information Security of Data Channels Based on a Multifunctional Tailored Software and Hardware Solution
p. 712 abstract
A Risk-Oriented Approach to the Control Arrangement of Security Protection Subsystems of Information Systems
p. 717 abstract
Intelligent Data Analysis in Information Security
p. 722 abstract
Detection of Anomalous Behavior in a Robot System Based on Deep Learning Elements
p. 726 abstract
Technology of Security Services Virtualization for High-Speed Computer Networks
p. 734 abstract
Applying the Group Signature for Entity Authentication in Distributed Grid Computing Networks
p. 739 abstract
Approaches to Protection of Applications Based on the TLS Protocol against Attacks Using Revoked Certificates
p. 743 abstract
Attainable Upper Estimate of the Degree of Distinguishability of a Connected Permutation Automaton
p. 749 abstract
Asymptotic Assessments of CRC Error Probabilities in Some Telecommunication Protocols
p. 759 abstract
Assessment of CRC Error Probability at Minor Distortion of Information
p. 765 abstract
KDP Scheme of Preliminary Key Distribution in Discretionary Security Policy
p. 773 abstract
Distribution of Cryptographic Keys in Systems with a Hierarchy of Objects
p. 777 abstract
User Identification and Authentication System Based on a Hybrid Fuzzy Approach
p. 787 abstract
Implementation of Symmetric Encryption by State Standard 28147–89 Algorithm on a Graphical Processor
p. 792 abstract
Tripartite Outsoursing Key-Agreement Protocol on Bilinear Pairings
p. 796 abstract
A Text Steganography Method Based on Markov Chains
p. 802 abstract
Multiagent System Controllability Evaluation Using the Multilevel Structure of the Graph of Agents
p. 809 abstract
Sustainability as a Criterion for Information Security in Cyber-Physical Systems
p. 813 abstract