|
|
Publications in Math-Net.Ru
-
Methods of runtime verification of industrial information security tools based on formal access control models.
Proceedings of ISP RAS, 37:3 (2025), 277–290
-
Solving the multilingualism problem in the international scientific and technical information space
Proceedings of ISP RAS, 35:6 (2023), 337–346
-
Elicitation of functional requirements from the application programming interface documentation for functional testing
Proceedings of ISP RAS, 34:1 (2022), 7–22
-
Runtime verification of operating systems based on abstract models
Proceedings of ISP RAS, 33:6 (2021), 15–26
-
Building a methodology for secure system software development on the example of operating systems
Proceedings of ISP RAS, 33:5 (2021), 25–40
-
Verification of compliance for multilevel models in individual trace semantics
Proceedings of ISP RAS, 32:6 (2020), 19–30
-
Monitoring and testing based on multi-level program specifications
Proceedings of ISP RAS, 32:6 (2020), 7–18
-
Architecture of a machine code deductive verification system
Proceedings of ISP RAS, 32:3 (2020), 7–19
-
Rendering system for the aircraft real-time OS JetOS
Proceedings of ISP RAS, 32:1 (2020), 57–70
-
Integrating RBAC, MIC, and MLS in verified hierarchical security model for operating system
Proceedings of ISP RAS, 32:1 (2020), 7–26
-
Requirements management for safety-critical systems. Overview of solutions
Proceedings of ISP RAS, 31:1 (2019), 25–48
-
Component-based verification of operating systems
Proceedings of ISP RAS, 30:6 (2018), 367–382
-
On representation of simulation time in functional programming style
Proceedings of ISP RAS, 30:6 (2018), 341–366
-
Formalizing metamodel of requirements management system
Proceedings of ISP RAS, 30:5 (2018), 163–176
-
Building modular real-time software from unified component model
Proceedings of ISP RAS, 30:3 (2018), 135–148
-
In-kernel memory-mapped I/O device emulation
Proceedings of ISP RAS, 30:3 (2018), 121–134
-
Using modularization in embedded OS
Proceedings of ISP RAS, 29:4 (2017), 283–294
-
ADV_SPM — Formal security policy models in practice
Proceedings of ISP RAS, 29:3 (2017), 43–56
-
Adjustable method with predicate abstraction for detection of race conditions in operating systems
Proceedings of ISP RAS, 28:6 (2016), 65–86
-
Design and architecture of real-time operating system
Proceedings of ISP RAS, 28:2 (2016), 181–192
-
Integration points of operating system verification techniques
Proceedings of ISP RAS, 27:5 (2015), 175–190
-
Using fault injection for testing Linux kernel components
Proceedings of ISP RAS, 27:5 (2015), 157–174
-
Python-based constraint language for architecture models
Proceedings of ISP RAS, 27:5 (2015), 143–156
-
Lightweight static analysis for data race detection in operating system kernels
Proceedings of ISP RAS, 27:5 (2015), 87–116
-
Towards deductive verification of C programs with shared data
Proceedings of ISP RAS, 27:4 (2015), 49–68
© , 2026