期 |
栏目 |
标题 |
文件 |
卷 50, 编号 8 (2016) |
Article |
Applying the group signature for entity authentication in distributed grid computing networks |
|
卷 50, 编号 8 (2016) |
Article |
Multiagent system controllability evaluation using the multilevel structure of the graph of agents |
|
卷 50, 编号 8 (2016) |
Article |
Sustainability as a criterion for information security in cyber-physical systems |
|
卷 51, 编号 8 (2017) |
Article |
Cyber-physical system homeostatic security management |
|
卷 51, 编号 8 (2017) |
Article |
Systematization and security assessment of cyber-physical systems |
|
卷 51, 编号 8 (2017) |
Article |
Use of Intel SGX to ensure the confidentiality of data of cloud users |
|
卷 51, 编号 8 (2017) |
Article |
Protection of Wi-Fi network users against rogue access points |
|
卷 52, 编号 8 (2018) |
Article |
Cyber-sustainability of Software-Defined Networks Based on Situational Management |
|
卷 52, 编号 8 (2018) |
Article |
Approaches to Modeling the Security of Cyberphysical Systems |
|
卷 52, 编号 8 (2018) |
Article |
A Blockchain Decentralized Public Key Infrastructure Model |
|
卷 52, 编号 8 (2018) |
Article |
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE |
|
卷 52, 编号 8 (2018) |
Article |
Analysis of the Information Security Threats in the Digital Production Networks |
|
卷 52, 编号 8 (2018) |
Article |
Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph |
|
卷 52, 编号 8 (2018) |
Article |
Problems of Security in Digital Production and Its Resistance to Cyber Threats |
|
卷 52, 编号 8 (2018) |
Article |
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology |
|
卷 52, 编号 8 (2018) |
Article |
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network |
|
卷 52, 编号 8 (2018) |
Article |
Architecture of the Protected Cloud Data Storage Using Intel SGX Technology |
|
卷 52, 编号 8 (2018) |
Article |
Digital Manufacturing Security Indicators |
|
卷 53, 编号 5 (2019) |
Article |
Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time |
|
卷 53, 编号 8 (2019) |
Article |
Application of an Artificial Neural Network for Detection of Attacks in VANETs |
|
卷 53, 编号 8 (2019) |
Article |
Big Data Management System Security Threat Model |
|
卷 53, 编号 8 (2019) |
Article |
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems |
|
卷 53, 编号 8 (2019) |
Article |
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things |
|
卷 53, 编号 8 (2019) |
Article |
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series |
|
卷 53, 编号 8 (2019) |
Article |
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls |
|