| 期 |
标题 |
文件 |
| 卷 50, 编号 8 (2016) |
A risk-oriented approach to the control arrangement of security protection subsystems of information systems |
|
|
Anisimov V., Zegzhda P., Anisimov E., Bazhin D.
|
| 卷 50, 编号 1 (2016) |
A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures |
|
|
Tesfahun A., Bhaskari D.
|
| 卷 51, 编号 1 (2017) |
A sufficient and necessary condition for stabilization of zeros in discrete-time multirate sampled systems |
|
|
Zeng C., Su Y., Liang S.
|
| 卷 50, 编号 8 (2016) |
A text steganography method based on Markov chains |
|
|
Shniperov A., Nikitina K.
|
| 卷 52, 编号 8 (2018) |
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems |
|
|
Zegzhda P., Poltavtseva M., Pechenkin A., Lavrova D., Zaitseva E.
|
| 卷 52, 编号 6 (2018) |
A Vehicular Opportunity Routing Protocol with Area Learning: Voal |
|
|
Wang X.
|
| 卷 53, 编号 1 (2019) |
About the Stability of Fuzzy Linear Automata |
|
|
Speranskiy D.
|
| 卷 50, 编号 8 (2016) |
Access control system for distributed computing networks |
|
|
Konoplev A., Kalinin M.
|
| 卷 52, 编号 8 (2018) |
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks |
|
|
Zegzhda P., Ivanov D., Moskvin D., Kubrin G.
|
| 卷 53, 编号 8 (2019) |
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series |
|
|
Zegzhda D., Kalinin M., Levykin M.
|
| 卷 53, 编号 3 (2019) |
Adaptive Force-Vision Control of Robot Manipulator Using Sliding Mode and Fuzzy Logic |
|
|
Djelal N., Saadia N., Ramdane-Cherif A.
|
| 卷 52, 编号 7 (2018) |
Age Groups in Hutchinson Equations |
|
|
Glyzin S.
|
| 卷 52, 编号 3 (2018) |
Algorithms for Indicating the Beginning of Accidents Based on the Estimate of the Density Distribution Function of the Noise of Technological Parameters |
|
|
Aliev T., Musaeva N., Suleymanova M.
|
| 卷 51, 编号 6 (2017) |
Algorithms for planning Resource-Intensive computing tasks in a hybrid supercomputer environment for simulating the characteristics of a quantum rotation sensor and performing engineering calculations |
|
|
Ilyashenko A., Lukashin A., Zaborovsky V., Lukashin A.
|
| 卷 51, 编号 8 (2017) |
An adaptive model of a distributed intrusion detection system |
|
|
Platonov V., Semenov P.
|
| 卷 50, 编号 6 (2016) |
An adaptive technique for trajectory tracking control of a wheeled mobile robots without velocity measurements |
|
|
Taheri-Kalani J., Zarei N.
|
| 卷 52, 编号 4 (2018) |
An Analysis of Positioning Method in AIS Ranging Mode |
|
|
Jiang Y., Zhang S., Teng J.
|
| 卷 51, 编号 6 (2017) |
An anisotropic-tolerant and error control localization algorithm in wireless sensor network |
|
|
Yao J., Yan X., Dou R.
|
| 卷 51, 编号 1 (2017) |
An approach for detecting and preventing DDoS attacks in campus |
|
|
Merouane M.
|
| 卷 53, 编号 8 (2019) |
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things |
|
|
Dakhnovich A., Moskvin D., Zegzhda D.
|
| 卷 50, 编号 8 (2016) |
An approach to developing the SIEM system for the Internet of Things |
|
|
Lavrova D.
|
| 卷 52, 编号 8 (2018) |
An Approach to the Programs Security Analysis using Vector Representation of Machine Code |
|
|
Demidov R., Pechenkin A.
|
| 卷 51, 编号 7 (2017) |
An Approach to Verification of a Family of Multiagent Systems for Conflict Resolution |
|
|
Garanina N., Sidorova E.
|
| 卷 52, 编号 8 (2018) |
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code |
|
|
Demidov R., Pechenkin A., Zegzhda P.
|
| 卷 52, 编号 3 (2018) |
An Approach Towards Development of a New Cloudlet Allocation Policy with Dynamic Time Quantum |
|
|
Banerjee S., Chowdhury A., Mukherjee S., Biswas U.
|
| 26 - 50 的 466 信息 |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |