|
|
Publications in Math-Net.Ru
-
Methods of runtime verification of industrial information security tools based on formal access control models.
Proceedings of ISP RAS, 37:3 (2025), 277–290
-
Software security by design
Proceedings of ISP RAS, 36:5 (2024), 7–16
-
Survey of software dynamic analysis methods
Proceedings of ISP RAS, 35:4 (2023), 7–44
-
Runtime verification of operating systems based on abstract models
Proceedings of ISP RAS, 33:6 (2021), 15–26
-
Monitoring and testing based on multi-level program specifications
Proceedings of ISP RAS, 32:6 (2020), 7–18
-
Integrating RBAC, MIC, and MLS in verified hierarchical security model for operating system
Proceedings of ISP RAS, 32:1 (2020), 7–26
-
Component-based verification of operating systems
Proceedings of ISP RAS, 30:6 (2018), 367–382
-
Asynchronous distributed algorithms for static and dynamic directed rooted graphs
Proceedings of ISP RAS, 30:1 (2018), 69–88
-
Verification and analysis of variable operating systems
Proceedings of ISP RAS, 28:3 (2016), 189–208
-
Integration points of operating system verification techniques
Proceedings of ISP RAS, 27:5 (2015), 175–190
-
On ranges of polynomials in the ring $M_2(\mathbb Z/8\mathbb Z)$
Fundam. Prikl. Mat., 6:1 (2000), 275–280
-
Images of graded polynomials in matrix rings over finite group algebras
Uspekhi Mat. Nauk, 55:2(332) (2000), 141–142
-
On images of polynomials in finite matrix rings
Fundam. Prikl. Mat., 3:2 (1997), 469–485
© , 2026