Automatic Control and Computer Sciences
ISSN 0146-4116 (Print)
ISSN 1558-108X (Online)
Menu
Archives
Home
About the Journal
Editorial Team
Editorial Policies
Author Guidelines
About the Journal
Issues
Search
Current
Archives
Contact
All Journals
User
Username
Password
Remember me
Forgot password?
Register
Notifications
View
Subscribe
Search
Search
Search Scope
All
Authors
Title
Abstract
Index terms
Full Text
Browse
By Issue
By Author
By Title
By Sections
Other Journals
Subscription
Login to verify subscription
Keywords
Big Data
CRC
VANET
asymptotics
authentication
cloud computing
cybersecurity
deep learning
delay
digital production
error probability
genetic algorithm
information security
large parameter
machine learning
neural network
relaxation oscillations
security
self-similarity
stability
verification
Information
For Readers
For Authors
For Librarians
×
User
Username
Password
Remember me
Forgot password?
Register
Notifications
View
Subscribe
Search
Search
Search Scope
All
Authors
Title
Abstract
Index terms
Full Text
Browse
By Issue
By Author
By Title
By Sections
Other Journals
Subscription
Login to verify subscription
Keywords
Big Data
CRC
VANET
asymptotics
authentication
cloud computing
cybersecurity
deep learning
delay
digital production
error probability
genetic algorithm
information security
large parameter
machine learning
neural network
relaxation oscillations
security
self-similarity
stability
verification
Information
For Readers
For Authors
For Librarians
Home
>
Search
>
Author Details
Author Details
Zegzhda, P. D.
Issue
Section
Title
File
Vol 50, No 8 (2016)
Article
A risk-oriented approach to the control arrangement of security protection subsystems of information systems
Vol 50, No 8 (2016)
Article
Technology of security services virtualization for high-speed computer networks
Vol 51, No 8 (2017)
Article
Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects
Vol 51, No 8 (2017)
Article
The use of an artificial neural network to detect automatically managed accounts in social networks
Vol 52, No 8 (2018)
Article
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity
Vol 52, No 8 (2018)
Article
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
Vol 52, No 8 (2018)
Article
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks
Vol 52, No 8 (2018)
Article
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security
Vol 52, No 8 (2018)
Article
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model
Vol 52, No 8 (2018)
Article
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks
Vol 52, No 8 (2018)
Article
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code
Vol 52, No 8 (2018)
Article
The Problem of Innovative Development of Information Security Systems in the Transport Sector
Vol 53, No 8 (2019)
Article
Model and Method for Optimizing Computational Processes in Parallel Computing Systems
This website uses cookies
You consent to our cookies if you continue to use our website.
About Cookies
TOP