The Tomsk-IEEE Seminar "The Intellectual Systems of Modeling, Design and Control"
A.S. Yatsenko, "Information Security Audit of the Informatization Object".
1. E.N. Gusakova, "Hybrid Algorithms and Software Tools for Building Ensembles of Fuzzy Classifiers and Approximators".
2. D.V. Chernykh, "Mathematical and Algorithmic Tools for Speech Signal Processing Based on Hearing Model".
1. A.R. Smolina, "Unified Methodic for Performing the Computer and Technical Expertise".
2. S.D. Tiunov, "Numerical Method, Algorithms and Software for the Calculation of the Pitch Frequency in Real Time".
1. A.O. Shumskaya, "Technique for Artificial Texts Identification".
2. A.Y. Ishakov, "Technique of Strong Authentication in ACS Based on Modern Identification Attributes".
S.V. Luchkova, "Algorithms and Software for Analysis of Multivariate Data with the Properties of oil Based on Statistical and Fuzzy Modeling".
O.S. Ternovoy, "Procedure and Tools for Early Detection and Counteraction to Threats of Violation of Information Security as a Result of DDOS Attacks".
Yilmaz Simsek, (Turkey). "On Generating Functions of the Special Numbers and Polynomials".
1. A.A. Shelupanov, "250 Anniversary of the Tomsk-IEEE Seminar".
2. A.A. Konev, "Technology for Determining the Level of InformationSecurity".
1. I.A. Rahmanenko, "Automatic Identification of the Speaker's Voice Using Gaussian Mixtures".
2. D.V. Saveliev, "Allocation and Verification of Critically Important Functions at the Level of Source Code".
1. I.V. Gorbunov, "Algorithms and software for the identification of Pareto-optimal fuzzy systems based on metaheuristic methods".
2. O.V. Gorskikh, E.M. Pokrovskaya, "Educational strategy of information and communication security of the person".
1. A.A. Orlov, "Software platform for the implementation of meta-learning on the basis of group accounting of arguments".
2. S.Yu. Iskhakov, "Identification of incidents in complex networks of security systems based on forecasting methods".
P.V. Malinin, "The use of projection methods of the analysis of multivariate data for voice identification".
1. A.V. Akhayev, "Models and algorithms for the selection of software products based on ontology and fuzzy measures".
2. M.A. Sopov, "Methodic for security estimation of the distributed system of certification centers".
1. E.T. Ageev, "Numerical-analytical method for modeling the trajectory characteristics of the signal in the data channel with perturbed parameters".
2. A.A. Orlov, "Models, algorithms and software platform for data mining based on method of group accounting of arguments".
1. O.S. Ternovoy, "Methods and tools for early detection and counteraction to threats of security breach as a result of DDOS attacks".
2. J.A. Martynov, "Mathematical models and algorithms for organization of route networks of urban passenger transport on the basis of the study of passenger traffic".
1. A.E. Anfilofev, "Hybrid algorithms and software tools for building fuzzy classifiers".
2. I.V. Gorbunov, "Algorithms and software for the identification of Pareto-optimal fuzzy systems based on metaheuristic methods".
1. A.A. Golubeva, "Models and algorithms for assessment of the state of linear objects of water and heat networks under uncertainty".
1. D.V. Kruchinin, "The method of obtaining closed expressions for polynomials based on degrees of generating functions".
2. R.I. Ashirbakiev, "Models, algorithms, and software for the quasi-static simulation of printed circuit boards using numerical methods".
1. M.A. Sopov, "The methodology of estimating the security of distributed certification centers".
2. S.D. Tiunov, "Model, numerical methods, and software package for voice acoustic analysis".
1. I.N. Shishkin, "RGB-synthesis selection method for analysis of earth remote sensing data".
2. A.O. Shumskaya, "The technique of artificially created text identification".
1. A.V. Akhaev, "Methodology, models, and algorithms for the selection of software products based on ontology and fuzzy measures".
2. P.V. Malinin, "The use of multivariable data projection methods analysis to the voice person identification".
1. M.A. Sopov, "The methodology of estimating the security of distributed certification centers system".
2. S.D. Tiunov, "Model, numerical methods, and software package for voice acoustic analysis in the tasks of phonopathy diagnosis".