Pesquisa

Edição
Título
Autores
Token scanning as a new scientific approach in the creation of protected systems: A new generation OS MICROTEK
Molyakov A.
Research on the security mechanism of cloud computing service model
Zhang Y.
Detection of Security Threats to Modern Websites
Ivanov D., Moskvin D., Kubrin G.
Estimating the Probability of a Checksum Error in a Message
Baranov A., Baranov P.
Application of Systems Theory Laws for Investigating Information Security Problems
Volkova V., Chernyi Y.
Security of a Key System of a Fiscal Feature
Gorbatov V., Zhukov I., Murashov O.
Semantic Security Tools in Software-Defined Networks
Antoshina E., Chalyy D.
Siamese neural network for intelligent information security control in multi-robot systems
Utkin L., Zaborovsky V., Popov S.
A logic-based framework for the security analysis of Industrial Control Systems
Lemaire L., Vossaert J., Jansen J., Naessens V.
A prototype computer with non-von Neumann architecture based on strategic domestic J7 microprocessor
Molyakov A.
Benford’s Law in the Detection of DoS Attacks on Industrial Systems
Aleksandrova E., Lavrova D., Yarmak A.
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers
Lokhvitskii V., Khomonenko A., Bol’shakov M.
Modeling the Dissemination of Information Threats in Social Media
Falcone I., Gatsenko O.
Comparative Analysis of Stability to Induced Deadlocks for Computing Grids with Various Node Architectures
Shmeleva T.
Application of clustering methods for analyzing the security of Android applications
Pavlenko E., Yarmak A., Moskvin D.
Implementation of symmetric encryption by State Standard 28147–89 algorithm on a graphical processor
Sukhoparov M., Lebedev I.
An approach to developing the SIEM system for the Internet of Things
Lavrova D.
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers
Pankov I., Konoplev A., Chernov A.
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Dakhnovich A., Zegzhda D., Moskvin D.
Cyber-sustainability of Software-Defined Networks Based on Situational Management
Zegzhda D., Pavlenko E.
Identifying a potential insider using classification models
Zaytsev A., Malyuk A.
Assessment of CRC error probability at minor distortion of information
Baranov A., Baranov P.
Design and Security Analysis of a Fragment of Internet of Things Telecommunication System
Alexandrov V., Desnitsky V., Chaly D.
The Problem of Innovative Development of Information Security Systems in the Transport Sector
Anisimov V., Anisimov E., Zegzhda P., Suprun A.
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security
Demidov R., Pechenkin A., Zegzhda P., Kalinin M.
26 - 50 de 69 resultados << < 1 2 3 > >> 
Dicas:
  • Palavras-chave são sensíveis a maiúsculas
  • Preposições e conjunções ingleses são ignoradas
  • Busca é feita por todos os palavras-chave (agente AND experimentador) por omissão
  • Use OR para pesquisar um termo exato, ex.: educação OR formação
  • Use parênteses para criar frases complexas, ex.: arquivo de ((revistas OR conferências) NOT teses)
  • Para pesquisar uma frase precisa use aspas duplas, ex.: "investigações científicas"
  • Exclua uma palavra utilizando o sinal - (hífen) ou operador NOT; ex.: concurso-de beleza ou concurso NOT de beleza
  • Use * como caractere-coringa, ex.: científic* recuperará as palavras "científico", "científicos", etc.