Issue |
Section |
Title |
File |
Vol 51, No 8 (2017) |
Article |
Hierarchical approach to analyzing security breaches in information systems |
|
Vol 51, No 8 (2017) |
Article |
Applying NFC for automated replication of user data |
|
Vol 51, No 8 (2017) |
Article |
Application of clustering methods for analyzing the security of Android applications |
|
Vol 51, No 8 (2017) |
Article |
Approaches to detecting active network nodes in IPv6 address space |
|
Vol 51, No 8 (2017) |
Article |
Protection of Wi-Fi network users against rogue access points |
|
Vol 52, No 8 (2018) |
Article |
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity |
|
Vol 52, No 8 (2018) |
Article |
Using Neural Networks to Detect Internal Intruders in VANETs |
|
Vol 52, No 8 (2018) |
Article |
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks |
|
Vol 52, No 8 (2018) |
Article |
Analysis of the Information Security Threats in the Digital Production Networks |
|
Vol 52, No 8 (2018) |
Article |
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology |
|
Vol 52, No 8 (2018) |
Article |
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network |
|
Vol 53, No 8 (2019) |
Article |
Application of an Artificial Neural Network for Detection of Attacks in VANETs |
|
Vol 53, No 8 (2019) |
Article |
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things |
|
Vol 53, No 8 (2019) |
Article |
Detection of Security Threats to Modern Websites |
|