Search

Issue
Title
Authors
Information security of data channels based on a multifunctional tailored software and hardware solution
Sukhoparov M.E., Lebedev I.S., Korzhuk V.M., Krivtsova I.E.
Protection of Valuable Information in Information Technologies
Grusho A.A., Grusho N.A., Zabezhaylo M.I., Timonina E.E.
Hierarchical approach to analyzing security breaches in information systems
Pavlenko E.Y., Yarmak A.V., Moskvin D.A.
Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects
Anisimov V.G., Anisimov E.G., Zegzhda P.D., Saurenko T.N., Prisyazhnyuk S.P.
Modeling of information influence on remote wireless network devices
Suhoparov M.E., Bazhaev N.A., Krivtsova I.E., Lebedev I.S.
Information security architecture synthesis in distributed information computation systems
Grusho A.A., Grusho N.A., Timonina E.E.
Management of information security risks in a context of uncertainty
Azhmukhamedov I.M., Vybornova O.N., Brumshtein Y.M.
Application of Systems Theory Laws for Investigating Information Security Problems
Volkova V.N., Chernyi Y.Y.
Intelligent data analysis in information security
Grusho A.A., Grusho N.A., Zabezhailo M.I., Timonina E.E.
Model of Cyberattacks on Digital Production Systems
Pavlenko E.Y.
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers
Lokhvitskii V.A., Khomonenko A.D., Bol’shakov M.A.
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Dakhnovich A.D., Zegzhda D.P., Moskvin D.A.
Deep Multi-Feature Learning for Water Body Extraction from Landsat Imagery
Yu L., Zhang R., Tian S., Yang L., Lv Y.
A risk-oriented approach to the control arrangement of security protection subsystems of information systems
Anisimov V.G., Zegzhda P.D., Anisimov E.G., Bazhin D.A.
Autonomous network-based integration architecture for multi-agent systems under dynamic and heterogeneous environment
Li H., Li X., Wan Y.
Benford’s Law in the Detection of DoS Attacks on Industrial Systems
Aleksandrova E.B., Lavrova D.S., Yarmak A.V.
Design and Security Analysis of a Fragment of Internet of Things Telecommunication System
Alexandrov V.A., Desnitsky V.A., Chaly D.Y.
The Problem of Innovative Development of Information Security Systems in the Transport Sector
Anisimov V.G., Anisimov E.G., Zegzhda P.D., Suprun A.F.
Application of Wireless Sensor Network in Urban Intelligent Traffic Information Acquisition
Niqin Jing
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Zaitseva E.A., Zegzhda D.P., Poltavtseva M.A.
Poetology: Problems of Constructing a Thesaurus and Verse Text Specification
Boykov V.N., Karyaeva M.S.
Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem
Salakhutdinova K.I., Lebedev I.S., Krivtsova I.E., Sukhoparov M.E.
Deep Learning and Semantic Concept Spaceare Used in Query Expansion
Li W., Wang S., Yu Z.
Cyber-physical system homeostatic security management
Zegzhda D.P., Pavlenko E.Y.
Token scanning as a new scientific approach in the creation of protected systems: A new generation OS MICROTEK
Molyakov A.S.
1 - 25 of 51 Items 1 2 3 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"