ISSN 0236-235X (P)
ISSN 2311-2735 (E)

Publication activity

(Information on the results of 2021)
2-year impact factor of the RSCI: 0,441
2-year impact factor of the RSCI without self-citation: 0,408
The two-year impact factor of the RSCI, taking into account citations from all
sources: 0,704
5-year impact factor of the RSCI: 0,417
5-year impact factor of the RSCI without self-citation: 0,382
The total number of citations of the journal in the RSCI: 9837
Herfindahl's five-year index of quoting journals: 149
Herfindahl Index by author organizations: 384
10-year Hirsch Index: 71
Place in the overall SCIENCE INDEX ranking: 196
Place in the SCIENCE INDEX ranking on the topic "Automation. Computer technology": 4
Place in the SCIENCE INDEX ranking on the topic "Cybernetics": 2

More information on the publication activity of our journal for 2008-2021 on the RSCI website.


Next issue

Publication date:
19 March 2023

Keyword: security of the information

  1. Mathematical modelling of the distributed systems of security of the information
  2. Authors: Давыдова Е.Н.

  3. Methods of solving the problem of access to service files under the conditions of mandatory access control
  4. Authors: Ефимов А.Ю.

  5. An experience in hardware implementation of functional modules of information security measures on variable logic integrated circuits
  6. Authors: Архангельский А.В., Торопченов Н.Ю.

  7. Data protection in self-organizing information system without using special facilities
  8. Authors: Дрождин В.В., Зинченко Р.Е.

  9. A methodical framework of analysis and synthesis of secure software development controls
  10. Authors: Марков А.С., Цирлов В.Л., Барабанов А.В.

  11. Problems of network traffic statistics processing to detect intrusion in existing information systems
  12. Authors: Ефимов А.Ю.

  13. A system and legal model of information security (data protection)
  14. Authors: Голубчиков С.В., Новиков В.К., Баранова А.В.

  15. An automated system of information accessibility protecting from attacks by unauthorized traffic in UNIX-like systems
  16. Authors: Пальчевский Е.В., Халиков А.Р.

  17. The effectiveness of stage-by-stage use of securirty means crossing threat detection areas
  18. Authors: Коломойцев В.С., Богатырев В.А.

  19. Web-robot detection method based on user’s navigation graph
  20. Authors: Гатчин Ю.А., Менщиков А.А.