| Шығарылым |
Бөлім |
Атауы |
Файл |
| Том 50, № 8 (2016) |
Article |
A risk-oriented approach to the control arrangement of security protection subsystems of information systems |
|
| Том 50, № 8 (2016) |
Article |
Technology of security services virtualization for high-speed computer networks |
|
| Том 51, № 8 (2017) |
Article |
Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects |
|
| Том 51, № 8 (2017) |
Article |
The use of an artificial neural network to detect automatically managed accounts in social networks |
|
| Том 52, № 8 (2018) |
Article |
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity |
|
| Том 52, № 8 (2018) |
Article |
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems |
|
| Том 52, № 8 (2018) |
Article |
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks |
|
| Том 52, № 8 (2018) |
Article |
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security |
|
| Том 52, № 8 (2018) |
Article |
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model |
|
| Том 52, № 8 (2018) |
Article |
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks |
|
| Том 52, № 8 (2018) |
Article |
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code |
|
| Том 52, № 8 (2018) |
Article |
The Problem of Innovative Development of Information Security Systems in the Transport Sector |
|
| Том 53, № 8 (2019) |
Article |
Model and Method for Optimizing Computational Processes in Parallel Computing Systems |
|