Search

Issue
Title
Authors
Cloud-Based Data Architecture Security
Semenov N.A., Poltavtsev A.A.
Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment
Shumin Xue , Chengjuan Ren
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.A.
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems
Magomedov S.G., Los’ V.P.
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology
Zegzhda D.P., Moskvin D.A., Myasnikov A.V.
An approach to developing the SIEM system for the Internet of Things
Lavrova D.S.
An ontological model of the domain of applications for the Internet of Things in analyzing information security
Lavrova D.S., Vasil’ev Y.S.
Robust CHARM: an efficient data hosting scheme for cloud data storage system
Thangapandiyan M., Rubesh Anand P.M.
Key Derivation Policy for data security and data integrity in cloud computing
Senthil Kumari P., Nadira Banu Kamal A.R.
Modeling Big Data Management Systems in Information Security
Poltavtseva M.A., Kalinin M.O.
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Dakhnovich A.D., Zegzhda D.P., Moskvin D.A.
Deduplication in the Backup System with Information Storage in a Database
Taranin S.M.
Identifying a potential insider using classification models
Zaytsev A.S., Malyuk A.A.
Intelligent data analysis in information security
Grusho A.A., Grusho N.A., Zabezhailo M.I., Timonina E.E.
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers
Lokhvitskii V.A., Khomonenko A.D., Bol’shakov M.A.
A New Technique for Intelligent Constructing Exact γ-content Tolerance Limits with Expected (1 – α)-confidence on Future Outcomes in the Weibull Case Using Complete or Type II Censored Data
Nechval N.A., Nechval K.N., Berzins G.
Applying NFC for automated replication of user data
Ivanov D.V., Moskvin D.A., Myasnikov A.V., Suprun A.F.
Information security of data channels based on a multifunctional tailored software and hardware solution
Sukhoparov M.E., Lebedev I.S., Korzhuk V.M., Krivtsova I.E.
Building a Data Store with the Dynamic Structure
Artamonov Y.N.
CRC Error Probability under Batch Random Noise
Baranov A.P., Baranov P.A.
Design of Sensor Data Fusion Algorithm for Mobile Robot Navigation Using ANFIS and Its Analysis Across the Membership Functions
Adarsh S., Ramachandran K.I.
Use of Intel SGX to ensure the confidentiality of data of cloud users
Zegzhda D.P., Usov E.S., Nikol’skii A.V., Pavlenko E.Y.
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE
Zegzhda D.P., Usov E.S., Nikol’skii A.V., Pavlenko E.Y.
Deep Mining of Redundant Data in Wireless Sensor Network Based on Genetic Algorithm
Diao H.
PolarDB: An infrastructure for specialized NoSQL datebases and DBMS
Marchuk A.G.
1 - 25 of 44 Items 1 2 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"