Issue |
Title |
File |
Vol 50, No 8 (2016) |
A risk-oriented approach to the control arrangement of security protection subsystems of information systems |
|
Anisimov V.G., Zegzhda P.D., Anisimov E.G., Bazhin D.A.
|
Vol 50, No 1 (2016) |
A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures |
|
Tesfahun A., Bhaskari D.L.
|
Vol 51, No 1 (2017) |
A sufficient and necessary condition for stabilization of zeros in discrete-time multirate sampled systems |
|
Zeng C., Su Y., Liang S.
|
Vol 50, No 8 (2016) |
A text steganography method based on Markov chains |
|
Shniperov A.N., Nikitina K.A.
|
Vol 52, No 8 (2018) |
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems |
|
Zegzhda P.D., Poltavtseva M.A., Pechenkin A.I., Lavrova D.S., Zaitseva E.A.
|
Vol 52, No 6 (2018) |
A Vehicular Opportunity Routing Protocol with Area Learning: Voal |
|
Wang X.
|
Vol 53, No 1 (2019) |
About the Stability of Fuzzy Linear Automata |
|
Speranskiy D.V.
|
Vol 50, No 8 (2016) |
Access control system for distributed computing networks |
|
Konoplev A.S., Kalinin M.O.
|
Vol 52, No 8 (2018) |
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks |
|
Zegzhda P.D., Ivanov D.V., Moskvin D.A., Kubrin G.S.
|
Vol 53, No 8 (2019) |
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series |
|
Zegzhda D.P., Kalinin M.O., Levykin M.V.
|
Vol 53, No 3 (2019) |
Adaptive Force-Vision Control of Robot Manipulator Using Sliding Mode and Fuzzy Logic |
|
Djelal N., Saadia N., Ramdane-Cherif A.
|
Vol 52, No 7 (2018) |
Age Groups in Hutchinson Equations |
|
Glyzin S.D.
|
Vol 52, No 3 (2018) |
Algorithms for Indicating the Beginning of Accidents Based on the Estimate of the Density Distribution Function of the Noise of Technological Parameters |
|
Aliev T.A., Musaeva N.F., Suleymanova M.T.
|
Vol 51, No 6 (2017) |
Algorithms for planning Resource-Intensive computing tasks in a hybrid supercomputer environment for simulating the characteristics of a quantum rotation sensor and performing engineering calculations |
|
Ilyashenko A.S., Lukashin A.A., Zaborovsky V.S., Lukashin A.A.
|
Vol 51, No 8 (2017) |
An adaptive model of a distributed intrusion detection system |
|
Platonov V.V., Semenov P.O.
|
Vol 50, No 6 (2016) |
An adaptive technique for trajectory tracking control of a wheeled mobile robots without velocity measurements |
|
Taheri-Kalani J., Zarei N.
|
Vol 52, No 4 (2018) |
An Analysis of Positioning Method in AIS Ranging Mode |
|
Jiang Y., Zhang S., Teng J.
|
Vol 51, No 6 (2017) |
An anisotropic-tolerant and error control localization algorithm in wireless sensor network |
|
Yao J., Yan X., Dou R.
|
Vol 51, No 1 (2017) |
An approach for detecting and preventing DDoS attacks in campus |
|
Merouane M.
|
Vol 53, No 8 (2019) |
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things |
|
Dakhnovich A.D., Moskvin D.A., Zegzhda D.P.
|
Vol 50, No 8 (2016) |
An approach to developing the SIEM system for the Internet of Things |
|
Lavrova D.S.
|
Vol 52, No 8 (2018) |
An Approach to the Programs Security Analysis using Vector Representation of Machine Code |
|
Demidov R.A., Pechenkin A.I.
|
Vol 51, No 7 (2017) |
An Approach to Verification of a Family of Multiagent Systems for Conflict Resolution |
|
Garanina N.O., Sidorova E.A.
|
Vol 52, No 8 (2018) |
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code |
|
Demidov R.A., Pechenkin A.I., Zegzhda P.D.
|
Vol 52, No 3 (2018) |
An Approach Towards Development of a New Cloudlet Allocation Policy with Dynamic Time Quantum |
|
Banerjee S., Chowdhury A., Mukherjee S., Biswas U.
|
26 - 50 of 466 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |