期 |
栏目 |
标题 |
文件 |
卷 50, 编号 8 (2016) |
Article |
A risk-oriented approach to the control arrangement of security protection subsystems of information systems |
|
卷 50, 编号 8 (2016) |
Article |
Technology of security services virtualization for high-speed computer networks |
|
卷 51, 编号 8 (2017) |
Article |
Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects |
|
卷 51, 编号 8 (2017) |
Article |
The use of an artificial neural network to detect automatically managed accounts in social networks |
|
卷 52, 编号 8 (2018) |
Article |
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity |
|
卷 52, 编号 8 (2018) |
Article |
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems |
|
卷 52, 编号 8 (2018) |
Article |
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks |
|
卷 52, 编号 8 (2018) |
Article |
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security |
|
卷 52, 编号 8 (2018) |
Article |
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model |
|
卷 52, 编号 8 (2018) |
Article |
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks |
|
卷 52, 编号 8 (2018) |
Article |
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code |
|
卷 52, 编号 8 (2018) |
Article |
The Problem of Innovative Development of Information Security Systems in the Transport Sector |
|
卷 53, 编号 8 (2019) |
Article |
Model and Method for Optimizing Computational Processes in Parallel Computing Systems |
|