Browse Title Index

Issue Title File
Vol 50, No 8 (2016) A risk-oriented approach to the control arrangement of security protection subsystems of information systems
Anisimov V.G., Zegzhda P.D., Anisimov E.G., Bazhin D.A.
Vol 50, No 1 (2016) A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures
Tesfahun A., Bhaskari D.L.
Vol 51, No 1 (2017) A sufficient and necessary condition for stabilization of zeros in discrete-time multirate sampled systems
Zeng C., Su Y., Liang S.
Vol 50, No 8 (2016) A text steganography method based on Markov chains
Shniperov A.N., Nikitina K.A.
Vol 52, No 8 (2018) A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
Zegzhda P.D., Poltavtseva M.A., Pechenkin A.I., Lavrova D.S., Zaitseva E.A.
Vol 52, No 6 (2018) A Vehicular Opportunity Routing Protocol with Area Learning: Voal
Wang X.
Vol 53, No 1 (2019) About the Stability of Fuzzy Linear Automata
Speranskiy D.V.
Vol 50, No 8 (2016) Access control system for distributed computing networks
Konoplev A.S., Kalinin M.O.
Vol 52, No 8 (2018) Actual Security Threats for Vehicular and Mobile Ad Hoc Networks
Zegzhda P.D., Ivanov D.V., Moskvin D.A., Kubrin G.S.
Vol 53, No 8 (2019) Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
Zegzhda D.P., Kalinin M.O., Levykin M.V.
Vol 53, No 3 (2019) Adaptive Force-Vision Control of Robot Manipulator Using Sliding Mode and Fuzzy Logic
Djelal N., Saadia N., Ramdane-Cherif A.
Vol 52, No 7 (2018) Age Groups in Hutchinson Equations
Glyzin S.D.
Vol 52, No 3 (2018) Algorithms for Indicating the Beginning of Accidents Based on the Estimate of the Density Distribution Function of the Noise of Technological Parameters
Aliev T.A., Musaeva N.F., Suleymanova M.T.
Vol 51, No 6 (2017) Algorithms for planning Resource-Intensive computing tasks in a hybrid supercomputer environment for simulating the characteristics of a quantum rotation sensor and performing engineering calculations
Ilyashenko A.S., Lukashin A.A., Zaborovsky V.S., Lukashin A.A.
Vol 51, No 8 (2017) An adaptive model of a distributed intrusion detection system
Platonov V.V., Semenov P.O.
Vol 50, No 6 (2016) An adaptive technique for trajectory tracking control of a wheeled mobile robots without velocity measurements
Taheri-Kalani J., Zarei N.
Vol 52, No 4 (2018) An Analysis of Positioning Method in AIS Ranging Mode
Jiang Y., Zhang S., Teng J.
Vol 51, No 6 (2017) An anisotropic-tolerant and error control localization algorithm in wireless sensor network
Yao J., Yan X., Dou R.
Vol 51, No 1 (2017) An approach for detecting and preventing DDoS attacks in campus
Merouane M.
Vol 53, No 8 (2019) An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
Dakhnovich A.D., Moskvin D.A., Zegzhda D.P.
Vol 50, No 8 (2016) An approach to developing the SIEM system for the Internet of Things
Lavrova D.S.
Vol 52, No 8 (2018) An Approach to the Programs Security Analysis using Vector Representation of Machine Code
Demidov R.A., Pechenkin A.I.
Vol 51, No 7 (2017) An Approach to Verification of a Family of Multiagent Systems for Conflict Resolution
Garanina N.O., Sidorova E.A.
Vol 52, No 8 (2018) An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code
Demidov R.A., Pechenkin A.I., Zegzhda P.D.
Vol 52, No 3 (2018) An Approach Towards Development of a New Cloudlet Allocation Policy with Dynamic Time Quantum
Banerjee S., Chowdhury A., Mukherjee S., Biswas U.
26 - 50 of 466 Items << < 1 2 3 4 5 6 7 8 9 10 > >>