Search

Issue
Title
Authors
Development of automated system for identifying abnormal network activity and detecting threats
Nikonov V.V., Los’ V.P., Ross G.V.
Analysis of the adaptive neural network router
Mikhailenko V.S., Solodovnik M.S.
Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks
Kalinin M.O., Krundyshev V.M., Rezedinova E.Y., Reshetov D.V.
A Vehicular Opportunity Routing Protocol with Area Learning: Voal
Wang X.
An anisotropic-tolerant and error control localization algorithm in wireless sensor network
Yao J., Yan X., Dou R.
Development of an active external network topology module for Floodlight software-defined network controller
Noskov A.A., Nikitinskiy M.A., Alekseev I.V.
Architectures for building secure vehicular networks based on SDN technology
Kalinin M.O., Krundyshev V.M., Semianov P.V.
Instrumental supporting system for developing and analysis of software-defined networks of mobile objects
Sokolov V.A., Korsakov S.V., Smirnov A.V., Bashkin V.A., Nikitin E.S.
Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices
Platonov V.V., Semenov P.O.
Coverage-All Targets Algorithm for 3D Wireless Multimedia Sensor Networks Based on the Gravitational Search Algorithm
Yanjiao Wang , Ye Chen
Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation
Lavrova D.S., Alekseev I.V., Shtyrkina A.A.
Application of Wireless Sensor Network in Urban Intelligent Traffic Information Acquisition
Niqin Jing
Siamese neural network for intelligent information security control in multi-robot systems
Utkin L.V., Zaborovsky V.S., Popov S.G.
Development and research of improved model of multipath adaptive routing in computer networks with load balancing
Koryachko V.P., Perepelkin D.A., Byshov V.S.
Detecting DDoS Attacks Using Machine Learning Techniques and Contemporary Intrusion Detection Dataset
Naveen Bindra , Manu Sood
Kernel Fuzzy Kohonen’s Clustering Neural Network and It’s Recursive Learning
Bodyanskiy Y.V., Deineko A.O., Eze F.M.
The use of an artificial neural network to detect automatically managed accounts in social networks
Zegzhda P.D., Malyshev E.V., Pavlenko E.Y.
Technology of security services virtualization for high-speed computer networks
Zegzhda P.D., Kalinin M.O.
Design of Printed log-Periodic Antennas for Long Range Communication within a Wireless Sensor Network for Sea Water Quality Monitoring
Gragnani G.L., Caviglia D.D., Montecucco C.
Complicated Dynamic Regimes in a Neural Network of Three Oscillators with a Delayed Broadcast Connection
Glyzin S.D., Marushkina E.A.
Generation of a Social Network Graph by Using Apache Spark
Belov Y.A., Vovchok S.I.
The effect of presynaptic inhibition in switching neurostructures
Sychev A.N.
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Dakhnovich A.D., Zegzhda D.P., Moskvin D.A.
An Approach to Verification of a Family of Multiagent Systems for Conflict Resolution
Garanina N.O., Sidorova E.A.
Cyber-sustainability of Software-Defined Networks Based on Situational Management
Zegzhda D.P., Pavlenko E.Y.
1 - 25 of 44 Items 1 2 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"