Article

标题 文件
卷 52, 编号 1 (2018) Improving Medical CT Image Blind Restoration Algorithm Based on Dictionary Learning by Alternating Direction Method of Multipliers PDF
(Eng)
Sun Y., Fei T., Zhang L., Liu X., Zhang J.
卷 52, 编号 1 (2018) Analysis of Cumulative Distribution Function of the Response Time in Cloud Computing Systems with Dynamic Scaling PDF
(Eng)
Sopin E., Gorbunova A., Gaidamaka Y., Zaripova E.
卷 52, 编号 1 (2018) A Hybrid Genetic and Ant Colony Algorithm for Finding the Shortest Path in Dynamic Traffic Networks PDF
(Eng)
Zhang S., Zhang Y.
卷 51, 编号 8 (2017) Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing PDF
(Eng)
Shenets N.
卷 51, 编号 8 (2017) Elliptic curves generation for isogeny-based cryptosystems PDF
(Eng)
Aleksandrova E., Shtyrkina A., Yarmak A.
卷 51, 编号 8 (2017) Data protection in radio channels of local differential satellite navigation subsystems PDF
(Eng)
Sikarev I., Shakhnov S.
卷 51, 编号 8 (2017) Detection of encrypted executable files based on entropy analysis to determine the randomness measure of byte sequences PDF
(Eng)
Alekseev I., Platonov V.
卷 51, 编号 8 (2017) Architectures for building secure vehicular networks based on SDN technology PDF
(Eng)
Kalinin M., Krundyshev V., Semianov P.
卷 51, 编号 8 (2017) Approaches to detecting active network nodes in IPv6 address space PDF
(Eng)
Ivanov D., Moskvin D., Ovasapyan T.
卷 51, 编号 8 (2017) Methods of group authentication for low-resource vehicle and flying self-organizing networks PDF
(Eng)
Aleksandrova E.
卷 51, 编号 8 (2017) Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions PDF
(Eng)
Baranov A., Baranov P.
卷 51, 编号 8 (2017) A method of providing the integrity of information in the group of robotic engineering complexes based on crypt-code constructions PDF
(Eng)
Samoylenko D., Eremeev M., Finko O.
卷 51, 编号 8 (2017) X-PACE: Modified Password Authenticated Connection Establishment protocol PDF
(Eng)
Shenets N., Trukhina E.
卷 51, 编号 8 (2017) Protection of Wi-Fi network users against rogue access points PDF
(Eng)
Zegzhda D., Moskvin D., Dakhnovich A.
卷 51, 编号 8 (2017) Intelligent data analysis in decision support systems for penetration tests PDF
(Eng)
Poltavtseva M., Pechenkin A.
卷 51, 编号 8 (2017) Modeling of information influence on remote wireless network devices PDF
(Eng)
Suhoparov M., Bazhaev N., Krivtsova I., Lebedev I.
卷 51, 编号 8 (2017) Analysis of the constructing principles and methodology for evaluating the security of shoulder-surfing resistant graphic passwords PDF
(Eng)
Yakovlev V., Arkhipov V., Adadurov S.
卷 51, 编号 8 (2017) Security evaluation of a wireless ad-hoc network with dynamic topology PDF
(Eng)
Kalinin M., Minin A.
卷 51, 编号 8 (2017) An adaptive model of a distributed intrusion detection system PDF
(Eng)
Platonov V., Semenov P.
卷 51, 编号 8 (2017) Cyber-physical system homeostatic security management PDF
(Eng)
Zegzhda D., Pavlenko E.
卷 51, 编号 8 (2017) An ontological model of the domain of applications for the Internet of Things in analyzing information security PDF
(Eng)
Lavrova D., Vasil’ev Y.
卷 51, 编号 8 (2017) Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects PDF
(Eng)
Anisimov V., Anisimov E., Zegzhda P., Saurenko T., Prisyazhnyuk S.
卷 51, 编号 8 (2017) Hierarchical approach to analyzing security breaches in information systems PDF
(Eng)
Pavlenko E., Yarmak A., Moskvin D.
卷 51, 编号 8 (2017) Systematization and security assessment of cyber-physical systems PDF
(Eng)
Zegzhda D., Poltavtseva M., Lavrova D.
卷 51, 编号 8 (2017) The task of building a trusted computing environment on the Intel hardware platform PDF
(Eng)
Chernov A., Konoplev A., Reshetov D.
251 - 275 的 463 信息 << < 6 7 8 9 10 11 12 13 14 15 > >>