Cyber Attack Prevention Based on Evolutionary Cybernetics Approach. | 0 | 0.34 | 2020 |
Estimating the sustainability of cyber-physical systems based on spectral graph theory | 0 | 0.34 | 2019 |
Sustainability of cyber-physical systems in the context of targeted destructive influences. | 0 | 0.34 | 2018 |
The use of an artificial neural network to detect automatically managed accounts in social networks. | 0 | 0.34 | 2017 |
Detecting Android application malicious behaviors based on the analysis of control flows and data flows. | 0 | 0.34 | 2017 |
Use of Intel SGX to ensure the confidentiality of data of cloud users. | 2 | 0.91 | 2017 |
Cyber-physical system homeostatic security management. | 5 | 0.59 | 2017 |
Solving hard instances in QF-BV combining Boolean reasoning with computer algebra. | 0 | 0.34 | 2009 |
A New Verification Technique for Custom-Designed Components at the Arithmetic Bit Level | 0 | 0.34 | 2009 |
Arithmetic Constraints in SAT-based Property Checking. | 0 | 0.34 | 2007 |