| 期 |
标题 |
文件 |
| 卷 52, 编号 1 (2018) |
Improving Medical CT Image Blind Restoration Algorithm Based on Dictionary Learning by Alternating Direction Method of Multipliers |
 (Eng)
|
|
Sun Y., Fei T., Zhang L., Liu X., Zhang J.
|
| 卷 52, 编号 1 (2018) |
Analysis of Cumulative Distribution Function of the Response Time in Cloud Computing Systems with Dynamic Scaling |
 (Eng)
|
|
Sopin E., Gorbunova A., Gaidamaka Y., Zaripova E.
|
| 卷 52, 编号 1 (2018) |
A Hybrid Genetic and Ant Colony Algorithm for Finding the Shortest Path in Dynamic Traffic Networks |
 (Eng)
|
|
Zhang S., Zhang Y.
|
| 卷 51, 编号 8 (2017) |
Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing |
 (Eng)
|
|
Shenets N.
|
| 卷 51, 编号 8 (2017) |
Elliptic curves generation for isogeny-based cryptosystems |
 (Eng)
|
|
Aleksandrova E., Shtyrkina A., Yarmak A.
|
| 卷 51, 编号 8 (2017) |
Data protection in radio channels of local differential satellite navigation subsystems |
 (Eng)
|
|
Sikarev I., Shakhnov S.
|
| 卷 51, 编号 8 (2017) |
Detection of encrypted executable files based on entropy analysis to determine the randomness measure of byte sequences |
 (Eng)
|
|
Alekseev I., Platonov V.
|
| 卷 51, 编号 8 (2017) |
Architectures for building secure vehicular networks based on SDN technology |
 (Eng)
|
|
Kalinin M., Krundyshev V., Semianov P.
|
| 卷 51, 编号 8 (2017) |
Approaches to detecting active network nodes in IPv6 address space |
 (Eng)
|
|
Ivanov D., Moskvin D., Ovasapyan T.
|
| 卷 51, 编号 8 (2017) |
Methods of group authentication for low-resource vehicle and flying self-organizing networks |
 (Eng)
|
|
Aleksandrova E.
|
| 卷 51, 编号 8 (2017) |
Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions |
 (Eng)
|
|
Baranov A., Baranov P.
|
| 卷 51, 编号 8 (2017) |
A method of providing the integrity of information in the group of robotic engineering complexes based on crypt-code constructions |
 (Eng)
|
|
Samoylenko D., Eremeev M., Finko O.
|
| 卷 51, 编号 8 (2017) |
X-PACE: Modified Password Authenticated Connection Establishment protocol |
 (Eng)
|
|
Shenets N., Trukhina E.
|
| 卷 51, 编号 8 (2017) |
Protection of Wi-Fi network users against rogue access points |
 (Eng)
|
|
Zegzhda D., Moskvin D., Dakhnovich A.
|
| 卷 51, 编号 8 (2017) |
Intelligent data analysis in decision support systems for penetration tests |
 (Eng)
|
|
Poltavtseva M., Pechenkin A.
|
| 卷 51, 编号 8 (2017) |
Modeling of information influence on remote wireless network devices |
 (Eng)
|
|
Suhoparov M., Bazhaev N., Krivtsova I., Lebedev I.
|
| 卷 51, 编号 8 (2017) |
Analysis of the constructing principles and methodology for evaluating the security of shoulder-surfing resistant graphic passwords |
 (Eng)
|
|
Yakovlev V., Arkhipov V., Adadurov S.
|
| 卷 51, 编号 8 (2017) |
Security evaluation of a wireless ad-hoc network with dynamic topology |
 (Eng)
|
|
Kalinin M., Minin A.
|
| 卷 51, 编号 8 (2017) |
An adaptive model of a distributed intrusion detection system |
 (Eng)
|
|
Platonov V., Semenov P.
|
| 卷 51, 编号 8 (2017) |
Cyber-physical system homeostatic security management |
 (Eng)
|
|
Zegzhda D., Pavlenko E.
|
| 卷 51, 编号 8 (2017) |
An ontological model of the domain of applications for the Internet of Things in analyzing information security |
 (Eng)
|
|
Lavrova D., Vasil’ev Y.
|
| 卷 51, 编号 8 (2017) |
Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects |
 (Eng)
|
|
Anisimov V., Anisimov E., Zegzhda P., Saurenko T., Prisyazhnyuk S.
|
| 卷 51, 编号 8 (2017) |
Hierarchical approach to analyzing security breaches in information systems |
 (Eng)
|
|
Pavlenko E., Yarmak A., Moskvin D.
|
| 卷 51, 编号 8 (2017) |
Systematization and security assessment of cyber-physical systems |
 (Eng)
|
|
Zegzhda D., Poltavtseva M., Lavrova D.
|
| 卷 51, 编号 8 (2017) |
The task of building a trusted computing environment on the Intel hardware platform |
 (Eng)
|
|
Chernov A., Konoplev A., Reshetov D.
|
| 251 - 275 的 463 信息 |
<< < 6 7 8 9 10 11 12 13 14 15 > >>
|