Article

Issue Title File
Vol 52, No 8 (2018) An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code PDF
(Eng)
Demidov R.A., Pechenkin A.I., Zegzhda P.D.
Vol 52, No 8 (2018) Modeling the Dissemination of Information Threats in Social Media PDF
(Eng)
Falcone I.I., Gatsenko O.Y.
Vol 52, No 8 (2018) Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model PDF
(Eng)
Demidov R.A., Zegzhda P.D., Kalinin M.O.
Vol 52, No 8 (2018) Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security PDF
(Eng)
Demidov R.A., Pechenkin A.I., Zegzhda P.D., Kalinin M.O.
Vol 52, No 8 (2018) Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices PDF
(Eng)
Platonov V.V., Semenov P.O.
Vol 52, No 8 (2018) The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity PDF
(Eng)
Zegzhda P.D., Ivanov D.V., Moskvin D.A., Ivanov A.A.
Vol 52, No 8 (2018) Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks PDF
(Eng)
Kalinin M.O., Krundyshev V.M., Rezedinova E.Y., Reshetov D.V.
Vol 52, No 8 (2018) Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series PDF
(Eng)
Kalinin M.O., Lavrova D.S., Yarmak A.V.
Vol 52, No 8 (2018) A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems PDF
(Eng)
Zegzhda P.D., Poltavtseva M.A., Pechenkin A.I., Lavrova D.S., Zaitseva E.A.
Vol 52, No 8 (2018) Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation PDF
(Eng)
Lavrova D.S., Alekseev I.V., Shtyrkina A.A.
Vol 52, No 8 (2018) Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks PDF
(Eng)
Zegzhda P.D., Lavrova D.S., Shtyrkina A.A.
Vol 52, No 8 (2018) A Distributed Intrusion Detection System with Protection from an Internal Intruder PDF
(Eng)
Shterenberg S.I., Poltavtseva M.A.
Vol 52, No 8 (2018) Using Neural Networks to Detect Internal Intruders in VANETs PDF
(Eng)
Ovasapyan T.D., Moskvin D.A., Kalinin M.O.
Vol 52, No 8 (2018) Ensuring Secure Data Input/Output Operations for SGX ENCLAVE PDF
(Eng)
Zegzhda D.P., Usov E.S., Nikol’skii A.V., Pavlenko E.Y.
Vol 52, No 8 (2018) Security Provision in Wireless Sensor Networks on the Basis of the Trust Model PDF
(Eng)
Ovasapyan T.D., Ivanov D.V.
Vol 52, No 8 (2018) CRC Error Probability under Batch Random Noise PDF
(Eng)
Baranov A.P., Baranov P.A.
Vol 52, No 8 (2018) Implementation of Mandatory Access Control in Distributed Systems PDF
(Eng)
Belim S.V., Belim S.Y.
Vol 52, No 8 (2018) Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network PDF
(Eng)
Dakhnovich A.D., Zegzhda D.P., Moskvin D.A.
Vol 52, No 8 (2018) Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels PDF
(Eng)
Belim S.V., Belim S.Y.
Vol 52, No 8 (2018) Use of Statistical Processing of Reference Images in Biometric Authentication Systems PDF
(Eng)
Los’ V.P., Ross G.V., Tyshuk E.D.
Vol 52, No 8 (2018) Architecture of the Protected Cloud Data Storage Using Intel SGX Technology PDF
(Eng)
Usov E.S., Nikol’skii A.V., Pavlenko E.Y., Zegzhda D.P.
Vol 52, No 8 (2018) Digital Manufacturing Security Indicators PDF
(Eng)
Zegzhda D.P., Pavlenko E.Y.
Vol 52, No 8 (2018) Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations PDF
(Eng)
Aleksandrova E.B., Shkorkina E.N.
Vol 52, No 8 (2018) Application of Systems Theory Laws for Investigating Information Security Problems PDF
(Eng)
Volkova V.N., Chernyi Y.Y.
Vol 52, No 8 (2018) Development of a Heuristic Mechanism for Detection of Malware Programs Based on Hidden Markov Models PDF
(Eng)
Kozachok A.V.
126 - 150 of 463 Items << < 1 2 3 4 5 6 7 8 9 10 > >> 

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies