Automatic Control and Computer Sciences
ISSN 0146-4116 (Print)
ISSN 1558-108X (Online)
Menu
Archives
Home
About the Journal
Editorial Team
Editorial Policies
Author Guidelines
About the Journal
Issues
Search
Current
Archives
Contact
All Journals
User
Username
Password
Remember me
Forgot password?
Register
Notifications
View
Subscribe
Search
Search
Search Scope
All
Authors
Title
Abstract
Index terms
Full Text
Browse
By Issue
By Author
By Title
By Sections
Other Journals
Subscription
Login to verify subscription
Keywords
Big Data
CRC
VANET
asymptotics
authentication
cloud computing
cybersecurity
deep learning
delay
digital production
error probability
genetic algorithm
information security
large parameter
machine learning
neural network
relaxation oscillations
security
self-similarity
stability
verification
Information
For Readers
For Authors
For Librarians
×
User
Username
Password
Remember me
Forgot password?
Register
Notifications
View
Subscribe
Search
Search
Search Scope
All
Authors
Title
Abstract
Index terms
Full Text
Browse
By Issue
By Author
By Title
By Sections
Other Journals
Subscription
Login to verify subscription
Keywords
Big Data
CRC
VANET
asymptotics
authentication
cloud computing
cybersecurity
deep learning
delay
digital production
error probability
genetic algorithm
information security
large parameter
machine learning
neural network
relaxation oscillations
security
self-similarity
stability
verification
Information
For Readers
For Authors
For Librarians
Home
>
Search
>
Author Details
Author Details
Zegzhda, D.
Issue
Section
Title
File
Vol 50, No 8 (2016)
Article
Applying the group signature for entity authentication in distributed grid computing networks
Vol 50, No 8 (2016)
Article
Multiagent system controllability evaluation using the multilevel structure of the graph of agents
Vol 50, No 8 (2016)
Article
Sustainability as a criterion for information security in cyber-physical systems
Vol 51, No 8 (2017)
Article
Cyber-physical system homeostatic security management
Vol 51, No 8 (2017)
Article
Systematization and security assessment of cyber-physical systems
Vol 51, No 8 (2017)
Article
Use of Intel SGX to ensure the confidentiality of data of cloud users
Vol 51, No 8 (2017)
Article
Protection of Wi-Fi network users against rogue access points
Vol 52, No 8 (2018)
Article
Cyber-sustainability of Software-Defined Networks Based on Situational Management
Vol 52, No 8 (2018)
Article
Approaches to Modeling the Security of Cyberphysical Systems
Vol 52, No 8 (2018)
Article
A Blockchain Decentralized Public Key Infrastructure Model
Vol 52, No 8 (2018)
Article
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE
Vol 52, No 8 (2018)
Article
Analysis of the Information Security Threats in the Digital Production Networks
Vol 52, No 8 (2018)
Article
Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph
Vol 52, No 8 (2018)
Article
Problems of Security in Digital Production and Its Resistance to Cyber Threats
Vol 52, No 8 (2018)
Article
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology
Vol 52, No 8 (2018)
Article
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Vol 52, No 8 (2018)
Article
Architecture of the Protected Cloud Data Storage Using Intel SGX Technology
Vol 52, No 8 (2018)
Article
Digital Manufacturing Security Indicators
Vol 53, No 5 (2019)
Article
Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time
Vol 53, No 8 (2019)
Article
Application of an Artificial Neural Network for Detection of Attacks in VANETs
Vol 53, No 8 (2019)
Article
Big Data Management System Security Threat Model
Vol 53, No 8 (2019)
Article
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Vol 53, No 8 (2019)
Article
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
Vol 53, No 8 (2019)
Article
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
Vol 53, No 8 (2019)
Article
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls
This website uses cookies
You consent to our cookies if you continue to use our website.
About Cookies
TOP