Pesquisa

Edição
Título
Autores
Cloud-Based Data Architecture Security
Semenov N., Poltavtsev A.
Generating optimized gate level information flow tracking logic for enforcing multilevel security
Tai Y., Hu W., Zhang H., Mu D., Huang X.
Cyber-physical system homeostatic security management
Zegzhda D., Pavlenko E.
Tasks of providing information security in distributed computing networks
Konoplev A., Kalinin M.
Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures
Grusho N.
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.
Hierarchical approach to analyzing security breaches in information systems
Pavlenko E., Yarmak A., Moskvin D.
Protection of Valuable Information in Information Technologies
Grusho A., Grusho N., Zabezhaylo M., Timonina E.
Model of Cyberattacks on Digital Production Systems
Pavlenko E.
Security evaluation of a wireless ad-hoc network with dynamic topology
Kalinin M., Minin A.
Digital Manufacturing Security Indicators
Zegzhda D., Pavlenko E.
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Zaitseva E., Zegzhda D., Poltavtseva M.
Modeling of information influence on remote wireless network devices
Suhoparov M., Bazhaev N., Krivtsova I., Lebedev I.
Design and Security Analysis of a Fragment of Internet of Things Telecommunication System
Alexandrov V., Desnitsky V., Chaly D.
The Problem of Innovative Development of Information Security Systems in the Transport Sector
Anisimov V., Anisimov E., Zegzhda P., Suprun A.
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security
Demidov R., Pechenkin A., Zegzhda P., Kalinin M.
X-PACE: Modified Password Authenticated Connection Establishment protocol
Shenets N., Trukhina E.
Systematization and security assessment of cyber-physical systems
Zegzhda D., Poltavtseva M., Lavrova D.
Asymptotic assessments of CRC error probabilities in some telecommunication protocols
Baranov A., Baranov P.
Management of information security risks in a context of uncertainty
Azhmukhamedov I., Vybornova O., Brumshtein Y.
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls
Ognev R., Zhukovskii E., Zegzhda D.
A Question-Answering System for Applicant Support Using Modern Messaging Apps
Filonov D., Chalyy D., Murin D., Durnev V., Sokolov V.
Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem
Salakhutdinova K., Lebedev I., Krivtsova I., Sukhoparov M.
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
Zegzhda P., Poltavtseva M., Pechenkin A., Lavrova D., Zaitseva E.
Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions
Baranov A., Baranov P.
1 - 25 de 69 resultados 1 2 3 > >> 
Dicas:
  • Palavras-chave são sensíveis a maiúsculas
  • Preposições e conjunções ingleses são ignoradas
  • Busca é feita por todos os palavras-chave (agente AND experimentador) por omissão
  • Use OR para pesquisar um termo exato, ex.: educação OR formação
  • Use parênteses para criar frases complexas, ex.: arquivo de ((revistas OR conferências) NOT teses)
  • Para pesquisar uma frase precisa use aspas duplas, ex.: "investigações científicas"
  • Exclua uma palavra utilizando o sinal - (hífen) ou operador NOT; ex.: concurso-de beleza ou concurso NOT de beleza
  • Use * como caractere-coringa, ex.: científic* recuperará as palavras "científico", "científicos", etc.