Automatic Control and Computer Sciences
ISSN 0146-4116 (Print)
ISSN 1558-108X (Online)
Menu
Archives
Home
About the Journal
Editorial Team
Editorial Policies
Author Guidelines
About the Journal
Issues
Search
Current
Retracted articles
Archives
Contact
All Journals
User
Username
Password
Remember me
Forgot password?
Register
Notifications
View
Subscribe
Search
Search
Search Scope
All
Authors
Title
Abstract
Index terms
Full Text
Browse
By Issue
By Author
By Title
By Sections
Other Journals
Subscription
Login to verify subscription
Keywords
Big Data
CRC
VANET
asymptotics
authentication
cloud computing
cybersecurity
deep learning
delay
digital production
error probability
genetic algorithm
information security
large parameter
machine learning
neural network
relaxation oscillations
security
self-similarity
stability
verification
×
User
Username
Password
Remember me
Forgot password?
Register
Notifications
View
Subscribe
Search
Search
Search Scope
All
Authors
Title
Abstract
Index terms
Full Text
Browse
By Issue
By Author
By Title
By Sections
Other Journals
Subscription
Login to verify subscription
Keywords
Big Data
CRC
VANET
asymptotics
authentication
cloud computing
cybersecurity
deep learning
delay
digital production
error probability
genetic algorithm
information security
large parameter
machine learning
neural network
relaxation oscillations
security
self-similarity
stability
verification
Home
>
Search
>
Author Details
Author Details
Yarmak, A. V.
Issue
Section
Title
File
Vol 51, No 8 (2017)
Article
Hierarchical approach to analyzing security breaches in information systems
Vol 51, No 8 (2017)
Article
Application of clustering methods for analyzing the security of Android applications
Vol 51, No 8 (2017)
Article
Elliptic curves generation for isogeny-based cryptosystems
Vol 52, No 8 (2018)
Article
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series
Vol 53, No 8 (2019)
Article
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems
Vol 53, No 8 (2019)
Article
Benford’s Law in the Detection of DoS Attacks on Industrial Systems
TOP