Name
Papers
Collaborators
PETER D. ZEGZHDA
28
41
Citations 
PageRank 
Referers 
22
11.92
36
Referees 
References 
200
72
Search Limit
100200
Title
Citations
PageRank
Year
Model and Method for Optimizing Computational Processes in Parallel Computing Systems.00.342019
Actual Security Threats for Vehicular and Mobile Ad Hoc Networks.00.342018
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security.00.342018
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model.00.342018
Artificial swarm algorithm for VANET protection against routing attacks.00.342018
The Problem of Innovative Development of Information Security Systems in the Transport Sector.00.342018
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code.00.342018
Role-Based Access Control for Vehicular Adhoc Networks10.432018
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems.00.342018
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks.10.372018
The use of an artificial neural network to detect automatically managed accounts in social networks.00.342017
Integer overflow vulnerabilities detection in software binary code.00.342017
Detecting Android application malicious behaviors based on the analysis of control flows and data flows.00.342017
Network security architectures for VANET.20.592017
Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects.00.342017
Modeling of information systems to their security evaluation.10.372017
Technology of security services virtualization for high-speed computer networks.00.342016
Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing.10.412016
A risk-oriented approach to the control arrangement of security protection subsystems of information systems.00.342016
Approach to the construction of the generalized functional-semantic cyber security model.51.102015
Automatic security management of computer systems.20.442015
Detection of anomalies in behavior of the software with usage of Markov chains.00.342015
Security modeling of grid systems using petri nets41.122012
Using graph theory for cloud system security modeling30.582012
Clarifying integrity control at the trusted information environment10.392010
Formal Verification Of Security Model Using Spr Tool10.382006
Vulnerabilities detection in the configurations of MS windows operating system00.342005
Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility00.342005