<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2016-1-4-72-76</article-id><article-id pub-id-type="publisher-id">897</article-id><article-categories><subj-group subj-group-type="heading"><subject>SYSTEM ANALYSIS AND PROCESSING OF KNOWLEDGE</subject></subj-group></article-categories><title-group><article-title>SPECIAL ASPECTS OF DETECTING UNAUTHORIZED TRANSMISSION DEVISES</article-title><trans-title-group xml:lang="en"><trans-title>SPECIAL ASPECTS OF DETECTING UNAUTHORIZED TRANSMISSION DEVISES</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Bukhantsov</surname><given-names>Andrey Dmitrievich</given-names></name><name xml:lang="en"><surname>Bukhantsov</surname><given-names>Andrey Dmitrievich</given-names></name></name-alternatives><email>bukhantsov@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Druzhkova</surname><given-names>Irina Viktorovna</given-names></name><name xml:lang="en"><surname>Druzhkova</surname><given-names>Irina Viktorovna</given-names></name></name-alternatives><email>984546@bsu.edu.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2016</year></pub-date><volume>1</volume><issue>4</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/economic/2016/4/10_it.pdf" /><abstract xml:lang="ru"><p>The paper suggests a possible approach to the modeling of the process of search and detection of radio bugging devices transmitting information once-off or in portions, to make recommendations to reduce the time and thus to increase the probability of detection of such devices.</p></abstract><trans-abstract xml:lang="en"><p>The paper suggests a possible approach to the modeling of the process of search and detection of radio bugging devices transmitting information once-off or in portions, to make recommendations to reduce the time and thus to increase the probability of detection of such devices.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>scanning receiver</kwd><kwd>bugging device</kwd><kwd>modeling</kwd><kwd>frequency range</kwd><kwd>scanning speed</kwd></kwd-group><kwd-group xml:lang="en"><kwd>scanning receiver</kwd><kwd>bugging device</kwd><kwd>modeling</kwd><kwd>frequency range</kwd><kwd>scanning speed</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>1. Horev А.А. Analog acoustic transmitting bugs / Spectekhnika i svyaz. 2010. № 1.</mixed-citation></ref><ref id="B2"><mixed-citation>2. Ananskiy E.V. What are transmitting bugs and how to detect them? / Sluzhba bezopasnosti. 1999. №10.</mixed-citation></ref><ref id="B3"><mixed-citation>3. Horev А.А. Methods and query facilities of electronic devices of intercepting information facilities. М.: МО RF, 1998. 224 p.</mixed-citation></ref><ref id="B4"><mixed-citation>4. Travin G. A., Goryunov V.V., Surovcev V.I., Perepelkin I.N. Direction-finding and recognition of difficult discretely-encoded (noise-similar) signals barely visible by RLS on the basis of application of computer technologies / Belgorod State University Scientific Bulletin. History. Politology. Economics. Information technologies. 2012. №13 (132). Vyp. 23/1.&amp;nbsp; Pp. 123-127.</mixed-citation></ref><ref id="B5"><mixed-citation>5. Krivtsun A.V. Radiomonitoring: frequency range / Spetstekhnika. 2012. №4.</mixed-citation></ref></ref-list></back></article>