Search

Issue
Title
Authors
The problem of finding the maximum multiple flow in the divisible network and its special cases
Smirnov A.V.
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks
Zegzhda P.D., Ivanov D.V., Moskvin D.A., Kubrin G.S.
Network Model for the Problem of Integer Balancing of a Four-Dimensional Matrix
Smirnov A.V.
Using Neural Networks to Detect Internal Intruders in VANETs
Ovasapyan T.D., Moskvin D.A., Kalinin M.O.
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity
Zegzhda P.D., Ivanov D.V., Moskvin D.A., Ivanov A.A.
The use of an artificial neural network to detect automatically managed accounts in social networks
Zegzhda P.D., Malyshev E.V., Pavlenko E.Y.
Preparing Datasets for Training in a Neural Network System of Intrusion Detection in Industrial Systems
Krundyshev V.M.
Modeling the Dissemination of Information Threats in Social Media
Falcone I.I., Gatsenko O.Y.
Semantic Security Tools in Software-Defined Networks
Antoshina E.J., Chalyy D.J.
Identifying a potential insider using classification models
Zaytsev A.S., Malyuk A.A.
Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks
Krundyshev V.M.
Enhanced Dynamic Load Balancing Algorithm in Computer Networks with Quality of Services
Koryachko V.P., Perepelkin D.A., Byshov V.S.
Development and research of improved model of multipath adaptive routing in computer networks with load balancing
Koryachko V.P., Perepelkin D.A., Byshov V.S.
Development of an adaptive routing mechanism in software-defined networks
Noskov A.N., Manov I.A.
Dynamic Model of Information Exchange Processes in a Peer-to-Peer Network
Kononova A.I.
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model
Demidov R.A., Zegzhda P.D., Kalinin M.O.
On-line kernel clustering based on the general regression neural network and T. Kohonen’s self-organizing map
Bodyanskiy Y.V., Deineko A.O., Kutsenko Y.V.
Using Radial Basis Function Neural Networks to identify river water data parameters
Wu W., Du W., Zhong J.
Application of Neural Networks for Recognizing Rail Structural Elements in Magnetic and Eddy Current Defectograms
Kuzmin E.V., Gorbunov O.E., Plotnikov P.O., Tyukin V.A., Bashkin V.A.
Modeling of information influence on remote wireless network devices
Suhoparov M.E., Bazhaev N.A., Krivtsova I.E., Lebedev I.S.
Face recognition Face2vec based on deep learning: Small database case
Sudars K.
LSTM-Based Robust Voicing Decision Applied to DNN-Based Speech Synthesis
Pradeep R., Reddy M.K., Rao K.S.
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks
Zegzhda P.D., Lavrova D.S., Shtyrkina A.A.
Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing
Shenets N.N.
Presenting a traffic management and control system in driver assistance form based on vehicular networks
Nejad A.E., Romoozi M.
1 - 25 of 35 Items 1 2 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"