| Шығарылым |
Атауы |
Файл |
| Том 52, № 8 (2018) |
Application of Systems Theory Laws for Investigating Information Security Problems |
|
|
Volkova V., Chernyi Y.
|
| Том 53, № 2 (2019) |
Application of Walsh Spectral Representations in Soft Computing |
|
|
Sychev A.
|
| Том 52, № 5 (2018) |
Application of Wireless Sensor Network in Urban Intelligent Traffic Information Acquisition |
|
|
Niqin Jing .
|
| Том 53, № 2 (2019) |
Application on Cold Chain Logistics Routing Optimization Based on Improved Genetic Algorithm |
|
|
Liyi Zhang ., Gao Y., Sun Y., Fei T., Wang Y.
|
| Том 52, № 8 (2018) |
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network |
|
|
Dakhnovich A., Zegzhda D., Moskvin D.
|
| Том 51, № 8 (2017) |
Applying NFC for automated replication of user data |
|
|
Ivanov D., Moskvin D., Myasnikov A., Suprun A.
|
| Том 53, № 2 (2019) |
Applying Space-Variant Point Spread Function to Three-Dimensional Reconstruction of Fluorescence Microscopic Images |
|
|
Yu Wang ., Chen X., Jiang H., Cao Q., Chen X.
|
| Том 50, № 8 (2016) |
Applying the group signature for entity authentication in distributed grid computing networks |
|
|
Aleksandrova E., Zegzhda D., Konoplev A.
|
| Том 53, № 5 (2019) |
Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time |
|
|
Lavrova D., Zaitseva E., Zegzhda D.
|
| Том 51, № 8 (2017) |
Approaches to detecting active network nodes in IPv6 address space |
|
|
Ivanov D., Moskvin D., Ovasapyan T.
|
| Том 52, № 8 (2018) |
Approaches to Modeling the Security of Cyberphysical Systems |
|
|
Zegzhda D., Vasil’ev Y., Poltavtseva M.
|
| Том 50, № 8 (2016) |
Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates |
|
|
Busygin A., Konoplev A., Kalinin M.
|
| Том 52, № 8 (2018) |
Architecture of the Protected Cloud Data Storage Using Intel SGX Technology |
|
|
Usov E., Nikol’skii A., Pavlenko E., Zegzhda D.
|
| Том 51, № 8 (2017) |
Architectures for building secure vehicular networks based on SDN technology |
|
|
Kalinin M., Krundyshev V., Semianov P.
|
| Том 50, № 8 (2016) |
Assessment of CRC error probability at minor distortion of information |
|
|
Baranov A., Baranov P.
|
| Том 52, № 8 (2018) |
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology |
|
|
Zegzhda D., Moskvin D., Myasnikov A.
|
| Том 50, № 8 (2016) |
Asymptotic assessments of CRC error probabilities in some telecommunication protocols |
|
|
Baranov A., Baranov P.
|
| Том 52, № 7 (2018) |
Asymptotic Expansions of Eigenvalues of Periodic and Antiperiodic Boundary Value Problems for Singularly Perturbed Second-Order Differential Equation with Turning Points |
|
|
Kashchenko S.
|
| Том 51, № 7 (2017) |
Asymptotic Expansions of Eigenvalues of the First Boundary-Value Problem for Singularly Perturbed Second-Order Differential Equation with Turning Points |
|
|
Kashchenko S.
|
| Том 51, № 7 (2017) |
Asymptotic Formula for the Moments of the Takagi Function |
|
|
Timofeev E.
|
| Том 53, № 7 (2019) |
Asymptotic Integration of Certain Differential Equations in Banach Space |
|
|
Nesterov P.
|
| Том 52, № 7 (2018) |
Asymptotical Distributions of Eigenvalues of Periodic and Antiperiodic Boundary Value Problems for Second-Order Differential Equations |
|
|
Kashchenko S.
|
| Том 51, № 7 (2017) |
Asymptotics for Solutions of Harmonic Oscillator with Integral Perturbation |
|
|
Nesterov P.
|
| Том 50, № 7 (2016) |
Asymptotics of eigenvalues of the first boundary-value problem for singularly perturbed second-order differential equation with turning points |
|
|
Kaschenko S.
|
| Том 51, № 7 (2017) |
Asymptotics, Stability, and Region of Attraction of Periodic Solution to a Singularly Perturbed Parabolic Problem with Double Root of a Degenerate Equation |
|
|
Butuzov V., Nefedov N., Recke L., Schneider K.
|
| Нәтижелер 466 - 76/100 |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |