浏览标题索引

标题 文件
卷 50, 编号 8 (2016) A risk-oriented approach to the control arrangement of security protection subsystems of information systems
Anisimov V., Zegzhda P., Anisimov E., Bazhin D.
卷 50, 编号 1 (2016) A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures
Tesfahun A., Bhaskari D.
卷 51, 编号 1 (2017) A sufficient and necessary condition for stabilization of zeros in discrete-time multirate sampled systems
Zeng C., Su Y., Liang S.
卷 50, 编号 8 (2016) A text steganography method based on Markov chains
Shniperov A., Nikitina K.
卷 52, 编号 8 (2018) A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
Zegzhda P., Poltavtseva M., Pechenkin A., Lavrova D., Zaitseva E.
卷 52, 编号 6 (2018) A Vehicular Opportunity Routing Protocol with Area Learning: Voal
Wang X.
卷 53, 编号 1 (2019) About the Stability of Fuzzy Linear Automata
Speranskiy D.
卷 50, 编号 8 (2016) Access control system for distributed computing networks
Konoplev A., Kalinin M.
卷 52, 编号 8 (2018) Actual Security Threats for Vehicular and Mobile Ad Hoc Networks
Zegzhda P., Ivanov D., Moskvin D., Kubrin G.
卷 53, 编号 8 (2019) Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
Zegzhda D., Kalinin M., Levykin M.
卷 53, 编号 3 (2019) Adaptive Force-Vision Control of Robot Manipulator Using Sliding Mode and Fuzzy Logic
Djelal N., Saadia N., Ramdane-Cherif A.
卷 52, 编号 7 (2018) Age Groups in Hutchinson Equations
Glyzin S.
卷 52, 编号 3 (2018) Algorithms for Indicating the Beginning of Accidents Based on the Estimate of the Density Distribution Function of the Noise of Technological Parameters
Aliev T., Musaeva N., Suleymanova M.
卷 51, 编号 6 (2017) Algorithms for planning Resource-Intensive computing tasks in a hybrid supercomputer environment for simulating the characteristics of a quantum rotation sensor and performing engineering calculations
Ilyashenko A., Lukashin A., Zaborovsky V., Lukashin A.
卷 51, 编号 8 (2017) An adaptive model of a distributed intrusion detection system
Platonov V., Semenov P.
卷 50, 编号 6 (2016) An adaptive technique for trajectory tracking control of a wheeled mobile robots without velocity measurements
Taheri-Kalani J., Zarei N.
卷 52, 编号 4 (2018) An Analysis of Positioning Method in AIS Ranging Mode
Jiang Y., Zhang S., Teng J.
卷 51, 编号 6 (2017) An anisotropic-tolerant and error control localization algorithm in wireless sensor network
Yao J., Yan X., Dou R.
卷 51, 编号 1 (2017) An approach for detecting and preventing DDoS attacks in campus
Merouane M.
卷 53, 编号 8 (2019) An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
Dakhnovich A., Moskvin D., Zegzhda D.
卷 50, 编号 8 (2016) An approach to developing the SIEM system for the Internet of Things
Lavrova D.
卷 52, 编号 8 (2018) An Approach to the Programs Security Analysis using Vector Representation of Machine Code
Demidov R., Pechenkin A.
卷 51, 编号 7 (2017) An Approach to Verification of a Family of Multiagent Systems for Conflict Resolution
Garanina N., Sidorova E.
卷 52, 编号 8 (2018) An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code
Demidov R., Pechenkin A., Zegzhda P.
卷 52, 编号 3 (2018) An Approach Towards Development of a New Cloudlet Allocation Policy with Dynamic Time Quantum
Banerjee S., Chowdhury A., Mukherjee S., Biswas U.
26 - 50 的 466 信息 << < 1 2 3 4 5 6 7 8 9 10 > >>