Model and Method for Optimizing Computational Processes in Parallel Computing Systems. | 0 | 0.34 | 2019 |
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks. | 0 | 0.34 | 2018 |
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security. | 0 | 0.34 | 2018 |
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model. | 0 | 0.34 | 2018 |
Artificial swarm algorithm for VANET protection against routing attacks. | 0 | 0.34 | 2018 |
The Problem of Innovative Development of Information Security Systems in the Transport Sector. | 0 | 0.34 | 2018 |
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code. | 0 | 0.34 | 2018 |
Role-Based Access Control for Vehicular Adhoc Networks | 1 | 0.43 | 2018 |
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems. | 0 | 0.34 | 2018 |
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks. | 1 | 0.37 | 2018 |
The use of an artificial neural network to detect automatically managed accounts in social networks. | 0 | 0.34 | 2017 |
Integer overflow vulnerabilities detection in software binary code. | 0 | 0.34 | 2017 |
Detecting Android application malicious behaviors based on the analysis of control flows and data flows. | 0 | 0.34 | 2017 |
Network security architectures for VANET. | 2 | 0.59 | 2017 |
Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects. | 0 | 0.34 | 2017 |
Modeling of information systems to their security evaluation. | 1 | 0.37 | 2017 |
Technology of security services virtualization for high-speed computer networks. | 0 | 0.34 | 2016 |
Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing. | 1 | 0.41 | 2016 |
A risk-oriented approach to the control arrangement of security protection subsystems of information systems. | 0 | 0.34 | 2016 |
Approach to the construction of the generalized functional-semantic cyber security model. | 5 | 1.10 | 2015 |
Automatic security management of computer systems. | 2 | 0.44 | 2015 |
Detection of anomalies in behavior of the software with usage of Markov chains. | 0 | 0.34 | 2015 |
Security modeling of grid systems using petri nets | 4 | 1.12 | 2012 |
Using graph theory for cloud system security modeling | 3 | 0.58 | 2012 |
Clarifying integrity control at the trusted information environment | 1 | 0.39 | 2010 |
Formal Verification Of Security Model Using Spr Tool | 1 | 0.38 | 2006 |
Vulnerabilities detection in the configurations of MS windows operating system | 0 | 0.34 | 2005 |
Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility | 0 | 0.34 | 2005 |