CASPIAN JOURNAL

MANAGEMENT AND HIGH TECHNOLOGIES

2022: 3 (59)
15.10.2022

Ivanov S.A., Shchipanov E.F., Zementckii I.V.
SYSTEM ANALYSIS OF INTRAPRENEURSHIP DEVELOPMENT INSTRUMENTS BASED ON DECISION-MAKING CRITERIA
9-16
Azhmukhamedov I.M., Khaytul A.V.
METHODOLOGY FOR INDIVIDUALIZATION OF THE DIGITAL ENVIRONMENT BASED ON DIAGNOSIS OF THE PSYCHO-EMOTIONAL STATE OF THE LEARNER
17-24
Petrenko V.I., Tebueva F.B., Pavlov A.S., Gurchinskiy M.M.
METHOD FOR TASKS ALLOCATION AND PLANNING THE SEQUENCE OF PERFORMING TASKS BY AGENTS OF SWARM ROBOTIC SYSTEMS UNDER UNCERTAINTY
25-43
Gordeev I.I., Saenko N.S.
COMPARISON OF GRASSBERGER AND AKHUNZHANOV ALGORITHMS FOR FINDING THE BACKBONE OF PERCOLATION CLUSTER IN PROBLEMS OF SITE PERCOLATION ON SQUARE LATTICE
44-60
Chastikova V.A., Gulyai V.G.
METHODOLOGY OF SOCIAL ENGINEERING ATTACK DETECTION BASED ON NATURAL LANGUAGE ANALYSIS ALGORITHMS
61-71
Kurchavov P.M., Maximova E.A.
USING MULTI-CRITERIA ANALYSIS TO ASSESS THE INTEGRITY OF THE SUBJECT OF CRITICAL INFORMATION INFRASTRUCTURE
72-83
Evsyukov M.V., Putyato M.M., Makaryan A.S., Nemchinova V.O.
PROTECTION METHODS IN MODERN VOICE AUTHENTICATION SYSTEMS
84-92
Chistousov N.K., Kalmykov I.A., Kopytov V.V., Tishchenko E.N., Chernyshev A.B.
DEVELOPMENT OF A SATELLITE AUTHENTICATION METHOD IMPLEMENTED IN A MODULAR CODE WITH PSEUDORANDOM REPLACEMENT OF GENERATIVE ELEMENTS
93-102
Shishkov S.A., Putyato M.M., Makaryan A.S., Nemchinova V.O.
DEVELOPMENT OF METHODS FOR DETECTING MALICIOUS IMPACT BASED ON CORRELATION ANALYSIS OF INFORMATION SECURITY EVENTS IN SIEM SYSTEMS
103-111
Sukhomlinov N.M., Finogeev A.G., Smirnova T.V., Ivashchenko V.D., Parygin D.S.
APPLICATION OF MICROCONTROLLER SYSTEMS IN RESEARCH (USING THE EXAMPLE OF THE ATWOOD MACHINE)
112-121