Автор туралы ақпарат

Zegzhda, D. P.

Шығарылым Бөлім Атауы Файл
Том 50, № 8 (2016) Article Applying the group signature for entity authentication in distributed grid computing networks
Том 50, № 8 (2016) Article Multiagent system controllability evaluation using the multilevel structure of the graph of agents
Том 50, № 8 (2016) Article Sustainability as a criterion for information security in cyber-physical systems
Том 51, № 8 (2017) Article Cyber-physical system homeostatic security management
Том 51, № 8 (2017) Article Systematization and security assessment of cyber-physical systems
Том 51, № 8 (2017) Article Use of Intel SGX to ensure the confidentiality of data of cloud users
Том 51, № 8 (2017) Article Protection of Wi-Fi network users against rogue access points
Том 52, № 8 (2018) Article Cyber-sustainability of Software-Defined Networks Based on Situational Management
Том 52, № 8 (2018) Article Approaches to Modeling the Security of Cyberphysical Systems
Том 52, № 8 (2018) Article A Blockchain Decentralized Public Key Infrastructure Model
Том 52, № 8 (2018) Article Ensuring Secure Data Input/Output Operations for SGX ENCLAVE
Том 52, № 8 (2018) Article Analysis of the Information Security Threats in the Digital Production Networks
Том 52, № 8 (2018) Article Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph
Том 52, № 8 (2018) Article Problems of Security in Digital Production and Its Resistance to Cyber Threats
Том 52, № 8 (2018) Article Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology
Том 52, № 8 (2018) Article Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Том 52, № 8 (2018) Article Architecture of the Protected Cloud Data Storage Using Intel SGX Technology
Том 52, № 8 (2018) Article Digital Manufacturing Security Indicators
Том 53, № 5 (2019) Article Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time
Том 53, № 8 (2019) Article Application of an Artificial Neural Network for Detection of Attacks in VANETs
Том 53, № 8 (2019) Article Big Data Management System Security Threat Model
Том 53, № 8 (2019) Article Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Том 53, № 8 (2019) Article An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
Том 53, № 8 (2019) Article Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
Том 53, № 8 (2019) Article Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls

Осы сайт cookie-файлдарды пайдаланады

Біздің сайтты пайдалануды жалғастыра отырып, сіз сайттың дұрыс жұмыс істеуін қамтамасыз ететін cookie файлдарын өңдеуге келісім бересіз.< / br>< / br>cookie файлдары туралы< / a>