ФГУП “НТЦ оборонного комплекса “Компас”
РУС
|
ENG
Forgot your password?
Enter
Register
Login As
You can log in if you are registered at one of these services:
Livejournal
Yandex
Mail.Ru
Liveinternet
Blogger
OpenID
.livejournal.com
@yandex.ru
@mail.ru
liveinternet.ru/users/
.blogspot.com
OpenID:
NEWS
SITE MAP
CONTACTS
SCIENTIFIC AND INFORMATION EDITIONS OF FSUE “The Scientific and Technical Center of the Defense Complex “Kompas”
About journal
Journal policy
Journal themes
Journal ethics
Journal history
Our authors
Editorial Board
Contacts
For readers
Private office
Search
Archive issues
Articles search according to sections
For authors
Private office
Journal sections
Right direction, review and publication scientific articles
Order of articles peer reviewing
Order of articles consideration
Subscription
FAQ
Statistics
Help Users
Helpful references
Main
Editions
“Вопросы защиты информации” (ВЗИ)
For readers
Contents of issue
Statistics
To obtain access to full text of journal and articles you must register!
2026 / 1
№
Price
Author
Article's name
1
500.00 rub
Belova O. A.
A real-time adaptive steganographic embedding method for increasing the volume of hidden information while maintaining disguise
2
500.00 rub
Bylinkin A. A.
Detection of short-term signals with a priori unknown parameters against the background of stationary noise and interference
3
500.00 rub
Troshkov A. M.
Serbin E. M.
Goryainov M. F.
Rachkov V. E.
Modern approaches to verifying the authenticity of identification data in information systems
4
500.00 rub
Lukashov A. A.
Faerman V. A.
Gekk D. S.
Terekhin A. O.
Analysis of optical channel security threats in quantum key distribution systems
5
500.00 rub
Prudnikov S. I.
Hybrid method for identifying information security threats based on graph neural networks
6
500.00 rub
Galmanov P. A.
Early indirect leakage probability in data enclaves
7
500.00 rub
Moldovyan A. A.
Moldovyan D. N.
Kostina A. A.
A post-quantum zero-knowledge authentication protocol and an algebraic digital signature algorithm based on it
8
500.00 rub
Morozova E. V.
Moldovyan D. N.
Moldovyan N. A.
Kostina A. A.
A post-quantum algebraic digital signature algorithm secure against equivalent-key attacks
9
500.00 rub
Tukmacheva M. A.
A comprehensive methodology for analyzing the risks of information security violations at hazardous production facilities in a metropolis, taking into account the connectivity of various types of security risks, standardization, clustering and ranking of critical facilities
10
500.00 rub
Pitelinsky K. V.
Rubanova E. R.
Serdyukova P. V.
Osipova E. V.
Development, updating and maintenance of organizational and technical documentation on information security in educational institutions: experience of a university
94
ISSUES
988
ARTICLES
2338
DOWNLOADS
Section has not been found.
CM
IE
ITDP
DIARSTP
ISQ
IIS
AP