Edição |
Título |
Arquivo |
Volume 53, Nº 8 (2019) |
Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption |
(Eng)
|
Shenets N.
|
Volume 53, Nº 8 (2019) |
Benford’s Law in the Detection of DoS Attacks on Industrial Systems |
(Eng)
|
Aleksandrova E., Lavrova D., Yarmak A.
|
Volume 53, Nº 8 (2019) |
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things |
(Eng)
|
Dakhnovich A., Moskvin D., Zegzhda D.
|
Volume 53, Nº 8 (2019) |
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems |
(Eng)
|
Zaitseva E., Zegzhda D., Poltavtseva M.
|
Volume 53, Nº 8 (2019) |
General Principles of Constructing a Motion Control System for a Remotely Operated Sea Vessel in the Port Area Based on the NMEA-2000 Network Protocol |
(Eng)
|
Sikarev I., Garanin A.
|
Volume 53, Nº 8 (2019) |
Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures |
(Eng)
|
Grusho N.
|
Volume 53, Nº 8 (2019) |
A Consistent Approach to Building Secure Big Data Processing and Storage Systems |
(Eng)
|
Poltavtseva M.
|
Volume 53, Nº 8 (2019) |
Big Data Management System Security Threat Model |
(Eng)
|
Poltavtseva M., Zegzhda D., Kalinin M.
|
Volume 53, Nº 8 (2019) |
Modeling Big Data Management Systems in Information Security |
(Eng)
|
Poltavtseva M., Kalinin M.
|
Volume 53, Nº 8 (2019) |
Application of an Artificial Neural Network for Detection of Attacks in VANETs |
(Eng)
|
Malyshev E., Moskvin D., Zegzhda D.
|
Volume 53, Nº 8 (2019) |
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems |
(Eng)
|
Magomedov S., Los’ V.
|
Volume 53, Nº 8 (2019) |
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems |
(Eng)
|
Aleksandrova E., Yarmak A., Kalinin M.
|
Volume 53, Nº 8 (2019) |
Estimating the Probability of a Checksum Error in a Message |
(Eng)
|
Baranov A., Baranov P.
|
Volume 53, Nº 8 (2019) |
Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters |
(Eng)
|
Lavrova D., Popova E., Shtyrkina A.
|
Volume 53, Nº 8 (2019) |
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers |
(Eng)
|
Pankov I., Konoplev A., Chernov A.
|
Volume 53, Nº 8 (2019) |
Detection of Security Threats to Modern Websites |
(Eng)
|
Ivanov D., Moskvin D., Kubrin G.
|
Volume 53, Nº 8 (2019) |
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users |
(Eng)
|
Aleksandrova E., Shkorkina E., Kalinin M.
|
Volume 53, Nº 8 (2019) |
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers |
(Eng)
|
Lokhvitskii V., Khomonenko A., Bol’shakov M.
|
Volume 53, Nº 8 (2019) |
Cloud-Based Data Architecture Security |
(Eng)
|
Semenov N., Poltavtsev A.
|
Volume 53, Nº 8 (2019) |
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls |
(Eng)
|
Ognev R., Zhukovskii E., Zegzhda D.
|
Volume 53, Nº 8 (2019) |
Model and Method for Optimizing Computational Processes in Parallel Computing Systems |
(Eng)
|
Anisimov V., Zegzhda P., Anisimov E., Saurenko T., Kasatkin V.
|
Volume 53, Nº 8 (2019) |
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions |
(Eng)
|
Doynikova E., Fedorchenko A., Kotenko I.
|
Volume 53, Nº 8 (2019) |
Maintaining Cyber Sustainability in Industrial Systems Based on the Concept of Molecular-Genetic Control Systems |
(Eng)
|
Lavrova D.
|
Volume 53, Nº 8 (2019) |
Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks |
(Eng)
|
Lavrova D.
|
Volume 53, Nº 8 (2019) |
Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model |
(Eng)
|
Pavlenko E.
|
1 - 25 de 463 resultados |
1 2 3 4 5 6 7 8 9 10 > >>
|