作者的详细信息

Zegzhda, D. P.

栏目 标题 文件
卷 50, 编号 8 (2016) Article Applying the group signature for entity authentication in distributed grid computing networks
卷 50, 编号 8 (2016) Article Multiagent system controllability evaluation using the multilevel structure of the graph of agents
卷 50, 编号 8 (2016) Article Sustainability as a criterion for information security in cyber-physical systems
卷 51, 编号 8 (2017) Article Cyber-physical system homeostatic security management
卷 51, 编号 8 (2017) Article Systematization and security assessment of cyber-physical systems
卷 51, 编号 8 (2017) Article Use of Intel SGX to ensure the confidentiality of data of cloud users
卷 51, 编号 8 (2017) Article Protection of Wi-Fi network users against rogue access points
卷 52, 编号 8 (2018) Article Cyber-sustainability of Software-Defined Networks Based on Situational Management
卷 52, 编号 8 (2018) Article Approaches to Modeling the Security of Cyberphysical Systems
卷 52, 编号 8 (2018) Article A Blockchain Decentralized Public Key Infrastructure Model
卷 52, 编号 8 (2018) Article Ensuring Secure Data Input/Output Operations for SGX ENCLAVE
卷 52, 编号 8 (2018) Article Analysis of the Information Security Threats in the Digital Production Networks
卷 52, 编号 8 (2018) Article Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph
卷 52, 编号 8 (2018) Article Problems of Security in Digital Production and Its Resistance to Cyber Threats
卷 52, 编号 8 (2018) Article Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology
卷 52, 编号 8 (2018) Article Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
卷 52, 编号 8 (2018) Article Architecture of the Protected Cloud Data Storage Using Intel SGX Technology
卷 52, 编号 8 (2018) Article Digital Manufacturing Security Indicators
卷 53, 编号 5 (2019) Article Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time
卷 53, 编号 8 (2019) Article Application of an Artificial Neural Network for Detection of Attacks in VANETs
卷 53, 编号 8 (2019) Article Big Data Management System Security Threat Model
卷 53, 编号 8 (2019) Article Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
卷 53, 编号 8 (2019) Article An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
卷 53, 编号 8 (2019) Article Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
卷 53, 编号 8 (2019) Article Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls
##common.cookie##