检索

标题
作者
Cloud-Based Data Architecture Security
Semenov N., Poltavtsev A.
Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment
Shumin Xue , Chengjuan Ren
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology
Zegzhda D., Moskvin D., Myasnikov A.
An approach to developing the SIEM system for the Internet of Things
Lavrova D.
An ontological model of the domain of applications for the Internet of Things in analyzing information security
Lavrova D., Vasil’ev Y.
Robust CHARM: an efficient data hosting scheme for cloud data storage system
Thangapandiyan M., Rubesh Anand P.
Key Derivation Policy for data security and data integrity in cloud computing
Senthil Kumari P., Nadira Banu Kamal A.
Modeling Big Data Management Systems in Information Security
Poltavtseva M., Kalinin M.
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems
Magomedov S., Los’ V.
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers
Lokhvitskii V., Khomonenko A., Bol’shakov M.
A New Technique for Intelligent Constructing Exact γ-content Tolerance Limits with Expected (1 – α)-confidence on Future Outcomes in the Weibull Case Using Complete or Type II Censored Data
Nechval N., Nechval K., Berzins G.
Applying NFC for automated replication of user data
Ivanov D., Moskvin D., Myasnikov A., Suprun A.
Information security of data channels based on a multifunctional tailored software and hardware solution
Sukhoparov M., Lebedev I., Korzhuk V., Krivtsova I.
Building a Data Store with the Dynamic Structure
Artamonov Y.
CRC Error Probability under Batch Random Noise
Baranov A., Baranov P.
Design of Sensor Data Fusion Algorithm for Mobile Robot Navigation Using ANFIS and Its Analysis Across the Membership Functions
Adarsh S., Ramachandran K.
Use of Intel SGX to ensure the confidentiality of data of cloud users
Zegzhda D., Usov E., Nikol’skii A., Pavlenko E.
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE
Zegzhda D., Usov E., Nikol’skii A., Pavlenko E.
Deep Mining of Redundant Data in Wireless Sensor Network Based on Genetic Algorithm
Diao H.
PolarDB: An infrastructure for specialized NoSQL datebases and DBMS
Marchuk A.
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions
Doynikova E., Fedorchenko A., Kotenko I.
Traffic Operation Data Analysis and Information Processing Based on Data Mining
Zhihuang Jiang
Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices
Platonov V., Semenov P.
Kernel Fuzzy Kohonen’s Clustering Neural Network and It’s Recursive Learning
Bodyanskiy Y., Deineko A., Eze F.
1 - 25 的 44 信息 1 2 > >> 

检索提示:

  • 检索的名词区分大小写
  • 常用字词将被忽略
  • 默认情况下只有在查询结果满足所有检索词才返回(例如,隐含AND)
  • 使用OR结合多个检索词,便于查找含有这些检索词的文章,例如education OR research
  • 使用括号来创建更复杂的查询; 例如:archive ((journal OR conference) NOT theses)
  • 使用引号检索一个完整的词组; 例如: "open access publishing"
  • 使用-或者NOT排除一个检索词; 例如:online -politics or online NOT politics
  • 在检索词里使用 *作为通配符匹配任何字符序列; 例如., soci* morality 将符合含有 "sociological" or "societal"的词语