Issue |
Title |
File |
Vol 52, No 8 (2018) |
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code |
(Eng)
|
Demidov R.A., Pechenkin A.I., Zegzhda P.D.
|
Vol 52, No 8 (2018) |
Modeling the Dissemination of Information Threats in Social Media |
(Eng)
|
Falcone I.I., Gatsenko O.Y.
|
Vol 52, No 8 (2018) |
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model |
(Eng)
|
Demidov R.A., Zegzhda P.D., Kalinin M.O.
|
Vol 52, No 8 (2018) |
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security |
(Eng)
|
Demidov R.A., Pechenkin A.I., Zegzhda P.D., Kalinin M.O.
|
Vol 52, No 8 (2018) |
Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices |
(Eng)
|
Platonov V.V., Semenov P.O.
|
Vol 52, No 8 (2018) |
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity |
(Eng)
|
Zegzhda P.D., Ivanov D.V., Moskvin D.A., Ivanov A.A.
|
Vol 52, No 8 (2018) |
Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks |
(Eng)
|
Kalinin M.O., Krundyshev V.M., Rezedinova E.Y., Reshetov D.V.
|
Vol 52, No 8 (2018) |
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series |
(Eng)
|
Kalinin M.O., Lavrova D.S., Yarmak A.V.
|
Vol 52, No 8 (2018) |
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems |
(Eng)
|
Zegzhda P.D., Poltavtseva M.A., Pechenkin A.I., Lavrova D.S., Zaitseva E.A.
|
Vol 52, No 8 (2018) |
Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation |
(Eng)
|
Lavrova D.S., Alekseev I.V., Shtyrkina A.A.
|
Vol 52, No 8 (2018) |
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks |
(Eng)
|
Zegzhda P.D., Lavrova D.S., Shtyrkina A.A.
|
Vol 52, No 8 (2018) |
A Distributed Intrusion Detection System with Protection from an Internal Intruder |
(Eng)
|
Shterenberg S.I., Poltavtseva M.A.
|
Vol 52, No 8 (2018) |
Using Neural Networks to Detect Internal Intruders in VANETs |
(Eng)
|
Ovasapyan T.D., Moskvin D.A., Kalinin M.O.
|
Vol 52, No 8 (2018) |
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE |
(Eng)
|
Zegzhda D.P., Usov E.S., Nikol’skii A.V., Pavlenko E.Y.
|
Vol 52, No 8 (2018) |
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model |
(Eng)
|
Ovasapyan T.D., Ivanov D.V.
|
Vol 52, No 8 (2018) |
CRC Error Probability under Batch Random Noise |
(Eng)
|
Baranov A.P., Baranov P.A.
|
Vol 52, No 8 (2018) |
Implementation of Mandatory Access Control in Distributed Systems |
(Eng)
|
Belim S.V., Belim S.Y.
|
Vol 52, No 8 (2018) |
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network |
(Eng)
|
Dakhnovich A.D., Zegzhda D.P., Moskvin D.A.
|
Vol 52, No 8 (2018) |
Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels |
(Eng)
|
Belim S.V., Belim S.Y.
|
Vol 52, No 8 (2018) |
Use of Statistical Processing of Reference Images in Biometric Authentication Systems |
(Eng)
|
Los’ V.P., Ross G.V., Tyshuk E.D.
|
Vol 52, No 8 (2018) |
Architecture of the Protected Cloud Data Storage Using Intel SGX Technology |
(Eng)
|
Usov E.S., Nikol’skii A.V., Pavlenko E.Y., Zegzhda D.P.
|
Vol 52, No 8 (2018) |
Digital Manufacturing Security Indicators |
(Eng)
|
Zegzhda D.P., Pavlenko E.Y.
|
Vol 52, No 8 (2018) |
Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations |
(Eng)
|
Aleksandrova E.B., Shkorkina E.N.
|
Vol 52, No 8 (2018) |
Application of Systems Theory Laws for Investigating Information Security Problems |
(Eng)
|
Volkova V.N., Chernyi Y.Y.
|
Vol 52, No 8 (2018) |
Development of a Heuristic Mechanism for Detection of Malware Programs Based on Hidden Markov Models |
(Eng)
|
Kozachok A.V.
|
126 - 150 of 463 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >>
|