| Edição |
Seção |
Título |
Arquivo |
| Volume 50, Nº 8 (2016) |
Article |
Access control system for distributed computing networks |
|
| Volume 50, Nº 8 (2016) |
Article |
Tasks of providing information security in distributed computing networks |
|
| Volume 50, Nº 8 (2016) |
Article |
Technology of security services virtualization for high-speed computer networks |
|
| Volume 50, Nº 8 (2016) |
Article |
Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates |
|
| Volume 51, Nº 8 (2017) |
Article |
Security evaluation of a wireless ad-hoc network with dynamic topology |
|
| Volume 51, Nº 8 (2017) |
Article |
Architectures for building secure vehicular networks based on SDN technology |
|
| Volume 52, Nº 8 (2018) |
Article |
Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks |
|
| Volume 52, Nº 8 (2018) |
Article |
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series |
|
| Volume 52, Nº 8 (2018) |
Article |
Using Neural Networks to Detect Internal Intruders in VANETs |
|
| Volume 52, Nº 8 (2018) |
Article |
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security |
|
| Volume 52, Nº 8 (2018) |
Article |
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model |
|
| Volume 52, Nº 8 (2018) |
Article |
Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence |
|
| Volume 53, Nº 8 (2019) |
Article |
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems |
|
| Volume 53, Nº 8 (2019) |
Article |
Modeling Big Data Management Systems in Information Security |
|
| Volume 53, Nº 8 (2019) |
Article |
Big Data Management System Security Threat Model |
|
| Volume 53, Nº 8 (2019) |
Article |
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users |
|
| Volume 53, Nº 8 (2019) |
Article |
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series |
|