Issue |
Section |
Title |
File |
Vol 50, No 8 (2016) |
Article |
Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster |
|
Vol 51, No 8 (2017) |
Article |
Systematization and security assessment of cyber-physical systems |
|
Vol 51, No 8 (2017) |
Article |
Intelligent data analysis in decision support systems for penetration tests |
|
Vol 52, No 8 (2018) |
Article |
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems |
|
Vol 52, No 8 (2018) |
Article |
A Distributed Intrusion Detection System with Protection from an Internal Intruder |
|
Vol 52, No 8 (2018) |
Article |
Approaches to Modeling the Security of Cyberphysical Systems |
|
Vol 52, No 8 (2018) |
Article |
Problems of Security in Digital Production and Its Resistance to Cyber Threats |
|
Vol 53, No 8 (2019) |
Article |
Modeling Big Data Management Systems in Information Security |
|
Vol 53, No 8 (2019) |
Article |
Big Data Management System Security Threat Model |
|
Vol 53, No 8 (2019) |
Article |
A Consistent Approach to Building Secure Big Data Processing and Storage Systems |
|
Vol 53, No 8 (2019) |
Article |
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems |
|