Issue |
Title |
File |
Vol 53, No 8 (2019) |
Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption |
(Eng)
|
Shenets N.N.
|
Vol 53, No 8 (2019) |
Benford’s Law in the Detection of DoS Attacks on Industrial Systems |
(Eng)
|
Aleksandrova E.B., Lavrova D.S., Yarmak A.V.
|
Vol 53, No 8 (2019) |
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things |
(Eng)
|
Dakhnovich A.D., Moskvin D.A., Zegzhda D.P.
|
Vol 53, No 8 (2019) |
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems |
(Eng)
|
Zaitseva E.A., Zegzhda D.P., Poltavtseva M.A.
|
Vol 53, No 8 (2019) |
General Principles of Constructing a Motion Control System for a Remotely Operated Sea Vessel in the Port Area Based on the NMEA-2000 Network Protocol |
(Eng)
|
Sikarev I.A., Garanin A.V.
|
Vol 53, No 8 (2019) |
Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures |
(Eng)
|
Grusho N.A.
|
Vol 53, No 8 (2019) |
A Consistent Approach to Building Secure Big Data Processing and Storage Systems |
(Eng)
|
Poltavtseva M.A.
|
Vol 53, No 8 (2019) |
Big Data Management System Security Threat Model |
(Eng)
|
Poltavtseva M.A., Zegzhda D.P., Kalinin M.O.
|
Vol 53, No 8 (2019) |
Modeling Big Data Management Systems in Information Security |
(Eng)
|
Poltavtseva M.A., Kalinin M.O.
|
Vol 53, No 8 (2019) |
Application of an Artificial Neural Network for Detection of Attacks in VANETs |
(Eng)
|
Malyshev E.V., Moskvin D.A., Zegzhda D.P.
|
Vol 53, No 8 (2019) |
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems |
(Eng)
|
Magomedov S.G., Los’ V.P.
|
Vol 53, No 8 (2019) |
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems |
(Eng)
|
Aleksandrova E.B., Yarmak A.V., Kalinin M.O.
|
Vol 53, No 8 (2019) |
Estimating the Probability of a Checksum Error in a Message |
(Eng)
|
Baranov A.P., Baranov P.A.
|
Vol 53, No 8 (2019) |
Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters |
(Eng)
|
Lavrova D.S., Popova E.A., Shtyrkina A.A.
|
Vol 53, No 8 (2019) |
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers |
(Eng)
|
Pankov I.D., Konoplev A.S., Chernov A.Y.
|
Vol 53, No 8 (2019) |
Detection of Security Threats to Modern Websites |
(Eng)
|
Ivanov D.V., Moskvin D.A., Kubrin G.S.
|
Vol 53, No 8 (2019) |
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users |
(Eng)
|
Aleksandrova E.B., Shkorkina E.N., Kalinin M.O.
|
Vol 53, No 8 (2019) |
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers |
(Eng)
|
Lokhvitskii V.A., Khomonenko A.D., Bol’shakov M.A.
|
Vol 53, No 8 (2019) |
Cloud-Based Data Architecture Security |
(Eng)
|
Semenov N.A., Poltavtsev A.A.
|
Vol 53, No 8 (2019) |
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls |
(Eng)
|
Ognev R.A., Zhukovskii E.V., Zegzhda D.P.
|
Vol 53, No 8 (2019) |
Model and Method for Optimizing Computational Processes in Parallel Computing Systems |
(Eng)
|
Anisimov V.G., Zegzhda P.D., Anisimov E.G., Saurenko T.N., Kasatkin V.V.
|
Vol 53, No 8 (2019) |
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions |
(Eng)
|
Doynikova E.V., Fedorchenko A.V., Kotenko I.V.
|
Vol 53, No 8 (2019) |
Maintaining Cyber Sustainability in Industrial Systems Based on the Concept of Molecular-Genetic Control Systems |
(Eng)
|
Lavrova D.S.
|
Vol 53, No 8 (2019) |
Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks |
(Eng)
|
Lavrova D.S.
|
Vol 53, No 8 (2019) |
Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model |
(Eng)
|
Pavlenko E.Y.
|
1 - 25 of 463 Items |
1 2 3 4 5 6 7 8 9 10 > >>
|