Search

Issue
Title
Authors
Traffic Operation Data Analysis and Information Processing Based on Data Mining
Zhihuang Jiang
Modeling the Dissemination of Information Threats in Social Media
Falcone I.I., Gatsenko O.Y.
Application of convolutional neural networks for preventing information leakage in open internet resources
Zhukov D.O., Akimov D.A., Red’kin O.K., Los’ V.P.
Assessment of CRC error probability at minor distortion of information
Baranov A.P., Baranov P.A.
Cloud-Based Data Architecture Security
Semenov N.A., Poltavtsev A.A.
Application of an Artificial Neural Network for Detection of Attacks in VANETs
Malyshev E.V., Moskvin D.A., Zegzhda D.P.
Cyber-sustainability of Software-Defined Networks Based on Situational Management
Zegzhda D.P., Pavlenko E.Y.
The use of an artificial neural network to detect automatically managed accounts in social networks
Zegzhda P.D., Malyshev E.V., Pavlenko E.Y.
Asymptotic assessments of CRC error probabilities in some telecommunication protocols
Baranov A.P., Baranov P.A.
Development of an adaptive routing mechanism in software-defined networks
Noskov A.N., Manov I.A.
Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model
Pavlenko E.Y.
Estimating the Probability of a Checksum Error in a Message
Baranov A.P., Baranov P.A.
Digital Manufacturing Security Indicators
Zegzhda D.P., Pavlenko E.Y.
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series
Kalinin M.O., Lavrova D.S., Yarmak A.V.
Identifying a potential insider using classification models
Zaytsev A.S., Malyuk A.A.
Generating optimized gate level information flow tracking logic for enforcing multilevel security
Tai Y., Hu W., Zhang H., Mu D., Huang X.
Model of Cyberattacks on Digital Production Systems
Pavlenko E.Y.
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers
Lokhvitskii V.A., Khomonenko A.D., Bol’shakov M.A.
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Dakhnovich A.D., Zegzhda D.P., Moskvin D.A.
Deep Multi-Feature Learning for Water Body Extraction from Landsat Imagery
Yu L., Zhang R., Tian S., Yang L., Lv Y.
A risk-oriented approach to the control arrangement of security protection subsystems of information systems
Anisimov V.G., Zegzhda P.D., Anisimov E.G., Bazhin D.A.
Autonomous network-based integration architecture for multi-agent systems under dynamic and heterogeneous environment
Li H., Li X., Wan Y.
Benford’s Law in the Detection of DoS Attacks on Industrial Systems
Aleksandrova E.B., Lavrova D.S., Yarmak A.V.
Design and Security Analysis of a Fragment of Internet of Things Telecommunication System
Alexandrov V.A., Desnitsky V.A., Chaly D.Y.
The Problem of Innovative Development of Information Security Systems in the Transport Sector
Anisimov V.G., Anisimov E.G., Zegzhda P.D., Suprun A.F.
26 - 50 of 51 Items << < 1 2 3 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"