Article

标题 文件
卷 53, 编号 8 (2019) Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption PDF
(Eng)
Shenets N.
卷 53, 编号 8 (2019) Benford’s Law in the Detection of DoS Attacks on Industrial Systems PDF
(Eng)
Aleksandrova E., Lavrova D., Yarmak A.
卷 53, 编号 8 (2019) An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things PDF
(Eng)
Dakhnovich A., Moskvin D., Zegzhda D.
卷 53, 编号 8 (2019) Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems PDF
(Eng)
Zaitseva E., Zegzhda D., Poltavtseva M.
卷 53, 编号 8 (2019) General Principles of Constructing a Motion Control System for a Remotely Operated Sea Vessel in the Port Area Based on the NMEA-2000 Network Protocol PDF
(Eng)
Sikarev I., Garanin A.
卷 53, 编号 8 (2019) Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures PDF
(Eng)
Grusho N.
卷 53, 编号 8 (2019) A Consistent Approach to Building Secure Big Data Processing and Storage Systems PDF
(Eng)
Poltavtseva M.
卷 53, 编号 8 (2019) Big Data Management System Security Threat Model PDF
(Eng)
Poltavtseva M., Zegzhda D., Kalinin M.
卷 53, 编号 8 (2019) Modeling Big Data Management Systems in Information Security PDF
(Eng)
Poltavtseva M., Kalinin M.
卷 53, 编号 8 (2019) Application of an Artificial Neural Network for Detection of Attacks in VANETs PDF
(Eng)
Malyshev E., Moskvin D., Zegzhda D.
卷 53, 编号 8 (2019) Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems PDF
(Eng)
Magomedov S., Los’ V.
卷 53, 编号 8 (2019) Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems PDF
(Eng)
Aleksandrova E., Yarmak A., Kalinin M.
卷 53, 编号 8 (2019) Estimating the Probability of a Checksum Error in a Message PDF
(Eng)
Baranov A., Baranov P.
卷 53, 编号 8 (2019) Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters PDF
(Eng)
Lavrova D., Popova E., Shtyrkina A.
卷 53, 编号 8 (2019) Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers PDF
(Eng)
Pankov I., Konoplev A., Chernov A.
卷 53, 编号 8 (2019) Detection of Security Threats to Modern Websites PDF
(Eng)
Ivanov D., Moskvin D., Kubrin G.
卷 53, 编号 8 (2019) Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users PDF
(Eng)
Aleksandrova E., Shkorkina E., Kalinin M.
卷 53, 编号 8 (2019) On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers PDF
(Eng)
Lokhvitskii V., Khomonenko A., Bol’shakov M.
卷 53, 编号 8 (2019) Cloud-Based Data Architecture Security PDF
(Eng)
Semenov N., Poltavtsev A.
卷 53, 编号 8 (2019) Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls PDF
(Eng)
Ognev R., Zhukovskii E., Zegzhda D.
卷 53, 编号 8 (2019) Model and Method for Optimizing Computational Processes in Parallel Computing Systems PDF
(Eng)
Anisimov V., Zegzhda P., Anisimov E., Saurenko T., Kasatkin V.
卷 53, 编号 8 (2019) Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions PDF
(Eng)
Doynikova E., Fedorchenko A., Kotenko I.
卷 53, 编号 8 (2019) Maintaining Cyber Sustainability in Industrial Systems Based on the Concept of Molecular-Genetic Control Systems PDF
(Eng)
Lavrova D.
卷 53, 编号 8 (2019) Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks PDF
(Eng)
Lavrova D.
卷 53, 编号 8 (2019) Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model PDF
(Eng)
Pavlenko E.
1 - 25 的 463 信息 1 2 3 4 5 6 7 8 9 10 > >> 
##common.cookie##