Мақалалар тізімі

Шығарылым Атауы Файл
Том 50, № 8 (2016) A risk-oriented approach to the control arrangement of security protection subsystems of information systems
Anisimov V., Zegzhda P., Anisimov E., Bazhin D.
Том 50, № 1 (2016) A SCADA testbed for investigating cyber security vulnerabilities in critical infrastructures
Tesfahun A., Bhaskari D.
Том 51, № 1 (2017) A sufficient and necessary condition for stabilization of zeros in discrete-time multirate sampled systems
Zeng C., Su Y., Liang S.
Том 50, № 8 (2016) A text steganography method based on Markov chains
Shniperov A., Nikitina K.
Том 52, № 8 (2018) A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
Zegzhda P., Poltavtseva M., Pechenkin A., Lavrova D., Zaitseva E.
Том 52, № 6 (2018) A Vehicular Opportunity Routing Protocol with Area Learning: Voal
Wang X.
Том 53, № 1 (2019) About the Stability of Fuzzy Linear Automata
Speranskiy D.
Том 50, № 8 (2016) Access control system for distributed computing networks
Konoplev A., Kalinin M.
Том 52, № 8 (2018) Actual Security Threats for Vehicular and Mobile Ad Hoc Networks
Zegzhda P., Ivanov D., Moskvin D., Kubrin G.
Том 53, № 8 (2019) Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
Zegzhda D., Kalinin M., Levykin M.
Том 53, № 3 (2019) Adaptive Force-Vision Control of Robot Manipulator Using Sliding Mode and Fuzzy Logic
Djelal N., Saadia N., Ramdane-Cherif A.
Том 52, № 7 (2018) Age Groups in Hutchinson Equations
Glyzin S.
Том 52, № 3 (2018) Algorithms for Indicating the Beginning of Accidents Based on the Estimate of the Density Distribution Function of the Noise of Technological Parameters
Aliev T., Musaeva N., Suleymanova M.
Том 51, № 6 (2017) Algorithms for planning Resource-Intensive computing tasks in a hybrid supercomputer environment for simulating the characteristics of a quantum rotation sensor and performing engineering calculations
Ilyashenko A., Lukashin A., Zaborovsky V., Lukashin A.
Том 51, № 8 (2017) An adaptive model of a distributed intrusion detection system
Platonov V., Semenov P.
Том 50, № 6 (2016) An adaptive technique for trajectory tracking control of a wheeled mobile robots without velocity measurements
Taheri-Kalani J., Zarei N.
Том 52, № 4 (2018) An Analysis of Positioning Method in AIS Ranging Mode
Jiang Y., Zhang S., Teng J.
Том 51, № 6 (2017) An anisotropic-tolerant and error control localization algorithm in wireless sensor network
Yao J., Yan X., Dou R.
Том 51, № 1 (2017) An approach for detecting and preventing DDoS attacks in campus
Merouane M.
Том 53, № 8 (2019) An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
Dakhnovich A., Moskvin D., Zegzhda D.
Том 50, № 8 (2016) An approach to developing the SIEM system for the Internet of Things
Lavrova D.
Том 52, № 8 (2018) An Approach to the Programs Security Analysis using Vector Representation of Machine Code
Demidov R., Pechenkin A.
Том 51, № 7 (2017) An Approach to Verification of a Family of Multiagent Systems for Conflict Resolution
Garanina N., Sidorova E.
Том 52, № 8 (2018) An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code
Demidov R., Pechenkin A., Zegzhda P.
Том 52, № 3 (2018) An Approach Towards Development of a New Cloudlet Allocation Policy with Dynamic Time Quantum
Banerjee S., Chowdhury A., Mukherjee S., Biswas U.
Нәтижелер 466 - 26/50 << < 1 2 3 4 5 6 7 8 9 10 > >>