Search

Issue
Title
Authors
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity
Zegzhda P.D., Ivanov D.V., Moskvin D.A., Ivanov A.A.
The use of an artificial neural network to detect automatically managed accounts in social networks
Zegzhda P.D., Malyshev E.V., Pavlenko E.Y.
The problem of finding the maximum multiple flow in the divisible network and its special cases
Smirnov A.V.
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks
Zegzhda P.D., Ivanov D.V., Moskvin D.A., Kubrin G.S.
Network Model for the Problem of Integer Balancing of a Four-Dimensional Matrix
Smirnov A.V.
Using Neural Networks to Detect Internal Intruders in VANETs
Ovasapyan T.D., Moskvin D.A., Kalinin M.O.
LSTM-Based Robust Voicing Decision Applied to DNN-Based Speech Synthesis
Pradeep R., Reddy M.K., Rao K.S.
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks
Zegzhda P.D., Lavrova D.S., Shtyrkina A.A.
Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing
Shenets N.N.
Presenting a traffic management and control system in driver assistance form based on vehicular networks
Nejad A.E., Romoozi M.
Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations
Aleksandrova E.B., Shkorkina E.N.
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series
Kalinin M.O., Lavrova D.S., Yarmak A.V.
Approaches to detecting active network nodes in IPv6 address space
Ivanov D.V., Moskvin D.A., Ovasapyan T.D.
Applying the group signature for entity authentication in distributed grid computing networks
Aleksandrova E.B., Zegzhda D.P., Konoplev A.S.
Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph
Busygin A.G., Konoplev A.S., Zegzhda D.P.
Application of convolutional neural networks for preventing information leakage in open internet resources
Zhukov D.O., Akimov D.A., Red’kin O.K., Los’ V.P.
Tasks of providing information security in distributed computing networks
Konoplev A.S., Kalinin M.O.
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model
Ovasapyan T.D., Ivanov D.V.
Equivalence of Conventional and Modified Network of Generalized Neural Elements
Konovalov E.V.
Access control system for distributed computing networks
Konoplev A.S., Kalinin M.O.
Preparing Datasets for Training in a Neural Network System of Intrusion Detection in Industrial Systems
Krundyshev V.M.
Modeling the Dissemination of Information Threats in Social Media
Falcone I.I., Gatsenko O.Y.
Semantic Security Tools in Software-Defined Networks
Antoshina E.J., Chalyy D.J.
Identifying a potential insider using classification models
Zaytsev A.S., Malyuk A.A.
Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks
Krundyshev V.M.
1 - 25 of 35 Items 1 2 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"