Article

Шығарылым Атауы Файл
Том 50, № 8 (2016) A text steganography method based on Markov chains PDF
(Eng)
Shniperov A., Nikitina K.
Том 50, № 8 (2016) Multiagent system controllability evaluation using the multilevel structure of the graph of agents PDF
(Eng)
Zegzhda D., Stepanova T., Suprun A.
Том 50, № 8 (2016) Sustainability as a criterion for information security in cyber-physical systems PDF
(Eng)
Zegzhda D.
Том 50, № 8 (2016) Attainable upper estimate of the degree of distinguishability of a connected permutation automaton PDF
(Eng)
Babash A.
Том 50, № 8 (2016) Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates PDF
(Eng)
Busygin A., Konoplev A., Kalinin M.
Том 50, № 8 (2016) A prototype computer with non-von Neumann architecture based on strategic domestic J7 microprocessor PDF
(Eng)
Molyakov A.
Том 50, № 8 (2016) Token scanning as a new scientific approach in the creation of protected systems: A new generation OS MICROTEK PDF
(Eng)
Molyakov A.
Том 50, № 8 (2016) Development of automated system for identifying abnormal network activity and detecting threats PDF
(Eng)
Nikonov V., Los’ V., Ross G.
Том 50, № 8 (2016) Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster PDF
(Eng)
Poltavtseva M., Lavrova D., Pechenkin A.
Том 50, № 8 (2016) Information security of data channels based on a multifunctional tailored software and hardware solution PDF
(Eng)
Sukhoparov M., Lebedev I., Korzhuk V., Krivtsova I.
Том 50, № 8 (2016) A risk-oriented approach to the control arrangement of security protection subsystems of information systems PDF
(Eng)
Anisimov V., Zegzhda P., Anisimov E., Bazhin D.
Том 50, № 8 (2016) Intelligent data analysis in information security PDF
(Eng)
Grusho A., Grusho N., Zabezhailo M., Timonina E.
Том 50, № 8 (2016) Detection of anomalous behavior in a robot system based on deep learning elements PDF
(Eng)
Utkin L., Zaborovskii V., Popov S.
Том 50, № 8 (2016) Technology of security services virtualization for high-speed computer networks PDF
(Eng)
Zegzhda P., Kalinin M.
Том 50, № 8 (2016) Applying the group signature for entity authentication in distributed grid computing networks PDF
(Eng)
Aleksandrova E., Zegzhda D., Konoplev A.
Том 50, № 6 (2016) The use of asynchronous sigma-delta modulation in analog-signal sampling based on event-timing techniques PDF
(Eng)
Rybakov A.
Том 50, № 6 (2016) On a strategy for the maintenance of an unreliable channel of a one-server loss queue PDF
(Eng)
Peschansky A., Kovalenko A.
Том 50, № 6 (2016) Procedure for calculating the dependence of the energy concealment factor on carrier frequency selection for low-frequency satellite communications system PDF
(Eng)
Chipiga A., Pashintsev V., Tsymbal V., Shimanov S.
Том 50, № 6 (2016) Principles of organizing the interoperability of equipollent nodes in a wireless mesh-network with time division multiple access PDF
(Eng)
Korsakov S., Smirnov A., Sokolov V.
Том 50, № 6 (2016) Tolerance limits on order statistics in future samples coming from the Pareto distribution PDF
(Eng)
Nechval N., Nechval K., Prisyazhnyuk S., Strelchonok V.
Том 50, № 6 (2016) An image segmentation method using automatic threshold based on improved genetic selecting algorithm PDF
(Eng)
Wang Z., Wang Y., Jiang L., Zhang C., Wang P.
Том 50, № 6 (2016) An adaptive technique for trajectory tracking control of a wheeled mobile robots without velocity measurements PDF
(Eng)
Taheri-Kalani J., Zarei N.
Том 50, № 5 (2016) Development of FEA-ANN hybrid model for Equivalent Stress prediction of automobile structural member PDF
(Eng)
Patel T., Bhatt N.
Том 50, № 5 (2016) Distributed control and speed sensorless for the synchronisation of multi-robot systems PDF
(Eng)
Bouteraa Y., Abdallah I.
Том 50, № 5 (2016) Face recognition system based on block Gabor feature collaborative representation PDF
(Eng)
Liu Z.
Нәтижелер 463 - 401/425 << < 12 13 14 15 16 17 18 19 > >>