Search

Issue
Title
Authors
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Zaitseva E.A., Zegzhda D.P., Poltavtseva M.A.
Poetology: Problems of Constructing a Thesaurus and Verse Text Specification
Boykov V.N., Karyaeva M.S.
Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem
Salakhutdinova K.I., Lebedev I.S., Krivtsova I.E., Sukhoparov M.E.
Deep Learning and Semantic Concept Spaceare Used in Query Expansion
Li W., Wang S., Yu Z.
Cyber-physical system homeostatic security management
Zegzhda D.P., Pavlenko E.Y.
Token scanning as a new scientific approach in the creation of protected systems: A new generation OS MICROTEK
Molyakov A.S.
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.A.
A Question-Answering System for Applicant Support Using Modern Messaging Apps
Filonov D.R., Chalyy D.J., Murin D.M., Durnev V.G., Sokolov V.A.
A prototype computer with non-von Neumann architecture based on strategic domestic J7 microprocessor
Molyakov A.S.
Big Data Management System Security Threat Model
Poltavtseva M.A., Zegzhda D.P., Kalinin M.O.
A Novel Fast Partition Algorithm Based on EDGE Information in HEVC
Zhi Liu , Zhang M., Lai D., An C.
Analysis of the Information Security Threats in the Digital Production Networks
Dakhnovich A.D., Moskvin D.A., Zegzhda D.P.
Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions
Baranov A.P., Baranov P.A.
Implementation of symmetric encryption by State Standard 28147–89 algorithm on a graphical processor
Sukhoparov M.E., Lebedev I.S.
Tasks of providing information security in distributed computing networks
Konoplev A.S., Kalinin M.O.
Modeling Big Data Management Systems in Information Security
Poltavtseva M.A., Kalinin M.O.
Traffic Operation Data Analysis and Information Processing Based on Data Mining
Zhihuang Jiang
Modeling the Dissemination of Information Threats in Social Media
Falcone I.I., Gatsenko O.Y.
Application of convolutional neural networks for preventing information leakage in open internet resources
Zhukov D.O., Akimov D.A., Red’kin O.K., Los’ V.P.
Assessment of CRC error probability at minor distortion of information
Baranov A.P., Baranov P.A.
Cloud-Based Data Architecture Security
Semenov N.A., Poltavtsev A.A.
Application of an Artificial Neural Network for Detection of Attacks in VANETs
Malyshev E.V., Moskvin D.A., Zegzhda D.P.
Cyber-sustainability of Software-Defined Networks Based on Situational Management
Zegzhda D.P., Pavlenko E.Y.
The use of an artificial neural network to detect automatically managed accounts in social networks
Zegzhda P.D., Malyshev E.V., Pavlenko E.Y.
Asymptotic assessments of CRC error probabilities in some telecommunication protocols
Baranov A.P., Baranov P.A.
26 - 50 of 51 Items << < 1 2 3 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"