Search

Issue
Title
Authors
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.A.
Cloud-Based Data Architecture Security
Semenov N.A., Poltavtsev A.A.
Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment
Shumin Xue , Chengjuan Ren
Robust CHARM: an efficient data hosting scheme for cloud data storage system
Thangapandiyan M., Rubesh Anand P.M.
Key Derivation Policy for data security and data integrity in cloud computing
Senthil Kumari P., Nadira Banu Kamal A.R.
Modeling Big Data Management Systems in Information Security
Poltavtseva M.A., Kalinin M.O.
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems
Magomedov S.G., Los’ V.P.
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology
Zegzhda D.P., Moskvin D.A., Myasnikov A.V.
An approach to developing the SIEM system for the Internet of Things
Lavrova D.S.
An ontological model of the domain of applications for the Internet of Things in analyzing information security
Lavrova D.S., Vasil’ev Y.S.
Refining the Renowned Route Performance on Location Information About Mobile Adhoc Network
Gundala Swathi
A Distributed Intrusion Detection System with Protection from an Internal Intruder
Shterenberg S.I., Poltavtseva M.A.
FCN and LSTM Based Computer Vision System for Recognition of Vehicle Type, License Plate Number, and Registration Country
Dorbe N., Jaundalders A., Kadikis R., Nesenbergs K.
A review of channel estimation and security techniques for CRNS
Senthilkumar S., Geetha Priya C.
Big Data Management System Security Threat Model
Poltavtseva M.A., Zegzhda D.P., Kalinin M.O.
A Lower Bound on Data Rates for Observability and Stabilizability of Linear Systems
Qingquan Liu , Bi Z., Ding R., Jin F.
Verification of Programs with Mutual Recursion in Pifagor Language
Ushakova M.S., Legalov A.I.
Data Rate Assessment on L2–L3 CPU Bus and Bus between CPU and RAM in Modern CPUs
Komar M.S.
Parallel method of production rules extraction based on computational intelligence
Oliinyk A., Skrupsky S., Subbotin S., Korobiichuk I.
Classification Methodology for Bioinformatics Data Analysis
Gasparovica-Asīte M., Aleksejeva L.
Loop-invariant Optimization in the Pifagor Language
Vasilev V.S., Legalov A.I.
Intelligent data analysis in decision support systems for penetration tests
Poltavtseva M.A., Pechenkin A.I.
User identification and authentication system based on a hybrid fuzzy approach
Sumkin K.S., Los’ V.P., Ross G.V.
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network
Dakhnovich A.D., Zegzhda D.P., Moskvin D.A.
Deduplication in the Backup System with Information Storage in a Database
Taranin S.M.
1 - 25 of 44 Items 1 2 > >> 

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"