Search

Issue
Title
Authors
Design and Security Analysis of a Fragment of Internet of Things Telecommunication System
Alexandrov V.A., Desnitsky V.A., Chaly D.Y.
The Problem of Innovative Development of Information Security Systems in the Transport Sector
Anisimov V.G., Anisimov E.G., Zegzhda P.D., Suprun A.F.
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security
Demidov R.A., Pechenkin A.I., Zegzhda P.D., Kalinin M.O.
X-PACE: Modified Password Authenticated Connection Establishment protocol
Shenets N.N., Trukhina E.E.
Systematization and security assessment of cyber-physical systems
Zegzhda D.P., Poltavtseva M.A., Lavrova D.S.
Asymptotic assessments of CRC error probabilities in some telecommunication protocols
Baranov A.P., Baranov P.A.
Management of information security risks in a context of uncertainty
Azhmukhamedov I.M., Vybornova O.N., Brumshtein Y.M.
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls
Ognev R.A., Zhukovskii E.V., Zegzhda D.P.
A Question-Answering System for Applicant Support Using Modern Messaging Apps
Filonov D.R., Chalyy D.J., Murin D.M., Durnev V.G., Sokolov V.A.
Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem
Salakhutdinova K.I., Lebedev I.S., Krivtsova I.E., Sukhoparov M.E.
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
Zegzhda P.D., Poltavtseva M.A., Pechenkin A.I., Lavrova D.S., Zaitseva E.A.
Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions
Baranov A.P., Baranov P.A.
Intelligent data analysis in information security
Grusho A.A., Grusho N.A., Zabezhailo M.I., Timonina E.E.
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions
Doynikova E.V., Fedorchenko A.V., Kotenko I.V.
Big Data Management System Security Threat Model
Poltavtseva M.A., Zegzhda D.P., Kalinin M.O.
Even Simple π-Calculus Processes Are Difficult to Analyze
Abbas M.M., Zakharov V.A.
Problems of Security in Digital Production and Its Resistance to Cyber Threats
Vasil’ev Y.S., Zegzhda D.P., Poltavtseva M.A.
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series
Kalinin M.O., Lavrova D.S., Yarmak A.V.
Architectures for building secure vehicular networks based on SDN technology
Kalinin M.O., Krundyshev V.M., Semianov P.V.
An ontological model of the domain of applications for the Internet of Things in analyzing information security
Lavrova D.S., Vasil’ev Y.S.
A risk-oriented approach to the control arrangement of security protection subsystems of information systems
Anisimov V.G., Zegzhda P.D., Anisimov E.G., Bazhin D.A.
Optimization of program recursive function calls analysis method
Shan C., Yu Z., Hu C., Xue J., Wu L.
Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model
Pavlenko E.Y.
Modeling Big Data Management Systems in Information Security
Poltavtseva M.A., Kalinin M.O.
Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset
Naveen Bindra , Manu Sood
26 - 50 of 69 Items << < 1 2 3 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies