Search

Issue
Title
Authors
An approach to developing the SIEM system for the Internet of Things
Lavrova D.S.
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers
Pankov I.D., Konoplev A.S., Chernov A.Y.
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Dakhnovich A.D., Zegzhda D.P., Moskvin D.A.
Cyber-sustainability of Software-Defined Networks Based on Situational Management
Zegzhda D.P., Pavlenko E.Y.
Identifying a potential insider using classification models
Zaytsev A.S., Malyuk A.A.
Assessment of CRC error probability at minor distortion of information
Baranov A.P., Baranov P.A.
Design and Security Analysis of a Fragment of Internet of Things Telecommunication System
Alexandrov V.A., Desnitsky V.A., Chaly D.Y.
The Problem of Innovative Development of Information Security Systems in the Transport Sector
Anisimov V.G., Anisimov E.G., Zegzhda P.D., Suprun A.F.
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security
Demidov R.A., Pechenkin A.I., Zegzhda P.D., Kalinin M.O.
X-PACE: Modified Password Authenticated Connection Establishment protocol
Shenets N.N., Trukhina E.E.
Systematization and security assessment of cyber-physical systems
Zegzhda D.P., Poltavtseva M.A., Lavrova D.S.
Asymptotic assessments of CRC error probabilities in some telecommunication protocols
Baranov A.P., Baranov P.A.
Management of information security risks in a context of uncertainty
Azhmukhamedov I.M., Vybornova O.N., Brumshtein Y.M.
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls
Ognev R.A., Zhukovskii E.V., Zegzhda D.P.
A Question-Answering System for Applicant Support Using Modern Messaging Apps
Filonov D.R., Chalyy D.J., Murin D.M., Durnev V.G., Sokolov V.A.
Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem
Salakhutdinova K.I., Lebedev I.S., Krivtsova I.E., Sukhoparov M.E.
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
Zegzhda P.D., Poltavtseva M.A., Pechenkin A.I., Lavrova D.S., Zaitseva E.A.
Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions
Baranov A.P., Baranov P.A.
Intelligent data analysis in information security
Grusho A.A., Grusho N.A., Zabezhailo M.I., Timonina E.E.
51 - 69 of 69 Items << < 1 2 3 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"