Background Image
Previous Page  10 / 12 Next Page
Information
Show Menu
Previous Page 10 / 12 Next Page
Page Background

10.

Горшков Ю.Г.

,

Бельфер Р.А.

Анализ риска информационной безопасности сетей

GSM при выполнении функций защиты приватности // Электросвязь. 2012. № 3.

С. 26–28.

11.

Бельфер Р.А.

,

Горшков Ю.Г.

,

Даннави М.Н.

Последствия нарушений маршрути-

зации общеканальной сигнализации на функционирование сетей связи общего

пользования // Вестник МГТУ им. Н.Э. Баумана. Сер. Приборостроение. 2009.

№ 3. С. 95–100.

12.

Бельфер Р.А.

,

Горшков Ю.Г.

,

Даннави М.Н.

Оценка снижения последствий угроз

нарушения маршрутизации в общеканальной сигнализации сетей связи общего

пользования // Вестник МГТУ им. Н.Э. Баумана. Сер. Приборостроение. 2009.

№ 4. С. 75–80.

13.

Sengar H.

,

Wijesekera D.

,

Jajodia S.

Authentication and Integrity in

telecommunication Signaling Network. Engineering of Computer-Based Systems.

12th IEEE International Conference and Workshops. P. 163–170.

14.

Yucun Yang

1,

Weiwei He

2,

Suili Feng

1. Security Analysis and Amendment of 3G

Core Network Based on MTPsec. IEEE Pacific-Asia Workshop on Computational

Intelligence and Industrial Application, 2008. P. 519–523.

15.

Sengar H.

,

Wijesekera D.

,

Jajodia S.

, “MTPSec: customizable secure MTP3

tunnels in the SS7 network”. Parallel and Distributed Processing Symposium, 2005.

Proceedings. 19th IEEE International.

16.

ITU-T Recommendation

E.408. Telecommunication Network Security Requirement,

2004.

17.

Матвеев В.А.

,

Морозов А.М.

Анализ результатов испытаний действующей се-

ти нового поколения NGN на уязвимость к атакам DoS // Вестник МГТУ

им. Н.Э. Баумана. Сер. Приборостроение. 2013. № 3. C. 43–57.

REFERENCES

[1] Matveev V.A., Morozov A.M., Bel’fer R.A. Assessing the Risk Level of Security

Threat of Fraud in the Voip Network via SIP.

Elektrosvyaz’

[Telecommunications],

2014, no. 6, pp. 35–38 (in Russ.).

[2] Matveev V.A., Morozov A.M., Bel’fer R.A. Methods of Ranging Fraud and DoS

Threats in the SIP, Based on the Hierarchy Analytic Methods and Pair Analysis.

Elektrosvyaz

’ [Telecommunications], 2014, no. 8, pp. 25–27 (in Russ.).

[3] Matveev V.A., Bel’fer R.A., Kalyuzhnyy A.M., Morozov A.M. Analysis of

Dependence of Risk Level of Safety of Communication Networks on Expert

Data during Calculations with the Use of a Model of the Illegible Sets.

Voprosy

kiberbezopasnosti

[Cybersecurity], 2014, no. 2, pp. 33–39 (in Russ.).

[4] Matveev V.A., Bel’fer R.A., Kalyuzhnyy D.A., Morozov A.M. Dependence Analysis

of Threat Risk Level of Fraud Security Within NGN Using Experimantal Data During

Calculation by Analytic Hierarchy Process and Set Pairs Analysis.

Vestn. Mosk. Gos.

Tekh. Univ. im. N.E. Baumana, Priborostr.

[Herald of the Bauman Moscow State

Tech. Univ., Instrum. Eng.], 2014, no. 6, pp. 84–95 (in Russ.).

[5] Antonyan A.B. The New Version of the General Scheme of Creation and

Development of a Russian Federal Public Mobile Radio Telephone Communication

GSM.

Elektrosvyaz

’ [Telecommunications], 2013, no. 1, pp. 17–21 (in Russ.).

[6] Marder N.S. Elektrosvyaz’ v Rossiyskoy Federatsii [Telecommunications in the

Russian Federation]. Moscow, IRIAS Publ., 2004. 96 p.

[7] Dryburgh L. Hewett J. Signaling System No. 7 (SS7/C7): Protocol, Architecture, and

Services. Front Cover. Cisco Press, 2005. Computers. 696 p.

[8] Roslyakov A.V. OKS No. 7. Arkhitektura, protokoly, primenenie [Architecture,

Protocols, Applications]. Moscow, Eko-Trendz Publ., 2008. 320 p.

136 ISSN 0236-3933. Вестник МГТУ им. Н.Э. Баумана. Сер. “Приборостроение”. 2015. № 4