Pesquisa

Edição
Título
Autores
Cloud-Based Data Architecture Security
Semenov N., Poltavtsev A.
Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment
Shumin Xue , Chengjuan Ren
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.
Modeling Big Data Management Systems in Information Security
Poltavtseva M., Kalinin M.
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems
Magomedov S., Los’ V.
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology
Zegzhda D., Moskvin D., Myasnikov A.
An approach to developing the SIEM system for the Internet of Things
Lavrova D.
An ontological model of the domain of applications for the Internet of Things in analyzing information security
Lavrova D., Vasil’ev Y.
Robust CHARM: an efficient data hosting scheme for cloud data storage system
Thangapandiyan M., Rubesh Anand P.
Key Derivation Policy for data security and data integrity in cloud computing
Senthil Kumari P., Nadira Banu Kamal A.
Classification Methodology for Bioinformatics Data Analysis
Gasparovica-Asīte M., Aleksejeva L.
Loop-invariant Optimization in the Pifagor Language
Vasilev V., Legalov A.
Intelligent data analysis in decision support systems for penetration tests
Poltavtseva M., Pechenkin A.
User identification and authentication system based on a hybrid fuzzy approach
Sumkin K., Los’ V., Ross G.
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Dakhnovich A., Zegzhda D., Moskvin D.
Deduplication in the Backup System with Information Storage in a Database
Taranin S.
Identifying a potential insider using classification models
Zaytsev A., Malyuk A.
Intelligent data analysis in information security
Grusho A., Grusho N., Zabezhailo M., Timonina E.
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers
Lokhvitskii V., Khomonenko A., Bol’shakov M.
A New Technique for Intelligent Constructing Exact γ-content Tolerance Limits with Expected (1 – α)-confidence on Future Outcomes in the Weibull Case Using Complete or Type II Censored Data
Nechval N., Nechval K., Berzins G.
Applying NFC for automated replication of user data
Ivanov D., Moskvin D., Myasnikov A., Suprun A.
Information security of data channels based on a multifunctional tailored software and hardware solution
Sukhoparov M., Lebedev I., Korzhuk V., Krivtsova I.
Building a Data Store with the Dynamic Structure
Artamonov Y.
CRC Error Probability under Batch Random Noise
Baranov A., Baranov P.
Design of Sensor Data Fusion Algorithm for Mobile Robot Navigation Using ANFIS and Its Analysis Across the Membership Functions
Adarsh S., Ramachandran K.
1 - 25 de 44 resultados 1 2 > >> 
Dicas:
  • Palavras-chave são sensíveis a maiúsculas
  • Preposições e conjunções ingleses são ignoradas
  • Busca é feita por todos os palavras-chave (agente AND experimentador) por omissão
  • Use OR para pesquisar um termo exato, ex.: educação OR formação
  • Use parênteses para criar frases complexas, ex.: arquivo de ((revistas OR conferências) NOT teses)
  • Para pesquisar uma frase precisa use aspas duplas, ex.: "investigações científicas"
  • Exclua uma palavra utilizando o sinal - (hífen) ou operador NOT; ex.: concurso-de beleza ou concurso NOT de beleza
  • Use * como caractere-coringa, ex.: científic* recuperará as palavras "científico", "científicos", etc.