|
|
Publications in Math-Net.Ru
-
Design and security analysis of a fragment of Internet of Things telecommunication system
Model. Anal. Inform. Sist., 23:6 (2016), 767–776
-
Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System
Tr. SPIIRAN, 48 (2016), 5–31
-
The use of expert knowledge for development of secure systems with embedded devices
Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2014, no. 4, 58–73
-
A technique for verification of network information flows in information and telecommunication systems with embedded devices
Tr. SPIIRAN, 30 (2013), 246–257
-
Configuring embedded information protection systems within services providing complex security on rail transport
Tr. SPIIRAN, 30 (2013), 40–55
-
Configuring embedded and mobile devices on the basis of solving an optimization problem
Tr. SPIIRAN, 19 (2011), 221–242
-
An aspect-oriented approach to realization of mobile module in the security model based on remote entrusting mechanism
Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2009, no. 4, 67–76
© , 2026