Search

Issue
Title
Authors
Application of clustering methods for analyzing the security of Android applications
Pavlenko E.Y., Yarmak A.V., Moskvin D.A.
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls
Ognev R.A., Zhukovskii E.V., Zegzhda D.P.
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems
Zegzhda P.D., Poltavtseva M.A., Pechenkin A.I., Lavrova D.S., Zaitseva E.A.
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions
Doynikova E.V., Fedorchenko A.V., Kotenko I.V.
Security evaluation of a wireless ad-hoc network with dynamic topology
Kalinin M.O., Minin A.A.
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Zaitseva E.A., Zegzhda D.P., Poltavtseva M.A.
Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures
Grusho N.A.
Hierarchical approach to analyzing security breaches in information systems
Pavlenko E.Y., Yarmak A.V., Moskvin D.A.
An approach to developing the SIEM system for the Internet of Things
Lavrova D.S.
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers
Pankov I.D., Konoplev A.S., Chernov A.Y.
Identifying a potential insider using classification models
Zaytsev A.S., Malyuk A.A.
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security
Demidov R.A., Pechenkin A.I., Zegzhda P.D., Kalinin M.O.
An ontological model of the domain of applications for the Internet of Things in analyzing information security
Lavrova D.S., Vasil’ev Y.S.
Optimization of program recursive function calls analysis method
Shan C., Yu Z., Hu C., Xue J., Wu L.
1 - 14 of 14 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"