检索

标题
作者
Numerical method for calculating the locations of safety system repeaters on terrain with obstacles
Startsev D., Loginov I., Sosunov V., Pligunov O.
Models and algorithms for identifying current threats based on an expert approach
Rychkova A., Dolgushev N., Burkova E., Konnov A.
THE APPLICATION OF MATHEMATICAL PROGRAMMING FOR SOLVING THE PROBLEM OF DESIGNING THE PROTECTION SYSTEM OF THE OBJECT OF CRITICAL INFRASTRUCTURE
Kartak V., Bashmakov N.
BASES OF INFORMATION SECURITY IN DEVELOPING SITES
Yuldashev T., Sheptunov S.
MODERN TECHNIQUES ARE USED TO EVALUATE THREATE AND VULNERABILITIES INFORMATION SYSTEMS
Gubareva O., Pugin V.
IDENTIFICATION OF DOS ATTACKS BY ANALYSIS OF SOME STATISTICAL CHARACTERISTICS OF TRAFFIC
Pozdnyak I., Plavan A.
WEB APPLICATION OF ESTIMATING PROTECTION SYSTEM EFFECTIVENESS OF THE ENTERPRISE
Bakhareva N., Fedorov S.
PROTECTION OF TRANSFER STEGAMESSAGES IN IMAGES
Azhmuhamedov I., Kolesova N.
A BRIEF OVERVIEW OF DATA HIDING METHODS IN DIGITAL IMAGES
Verdiyev S., Naghiyeva A.
MODELING IS SECURE OF TELECOMMUNICATION CHANNELS WITH USING VIRTUALIZATION
Vasin N., Irbakhtin A.
INCREASE IN THE SAFETY OF COMPUTER SYSTEMS AND NETWORKS ON THE BASIS OF THE ANALYSIS OF NET TRAFFIC
Azhmukhamedov I., Marjenkov A.
Features of Flash Drives Information Security
Vasilenko K., Zolkin A., Abramov N., Kurganov D.
INTEGRATED ASSESSMENT OF INFORMATION SECURITY REQUIREMENTS IMPLEMENTATION IN AUTOMATED CONTROL SYSTEMS INTENDED FOR PRODUCTION AND TECHNOLOGICAL PROCESSES
Vasilyev V., Vulfin A., Guzairov M., Kirillova A.
SPATIAL FREQUENCY CHARACTERISTICS OF ELECTROMAGNETIC EXCITATION OF COMPLEX RANDOM ANTENNAS
Zasedateleva P., Maslov O.
Augmented reality: the orifi cal principles, new opportunities and security threats
Maslov O.
ALGORITHMIZATION OF NON-REFLECTIVE SYSTEMS QUASIOPTIMAL CONTROL USING STATISTICAL SIMULATION MODELLING
Dimov E., Maslov O.
INTRACORPORATE COMPETITION AS A BUSINESS SECURITY THREAT
Maslov O.
MODERN ACHIEVEMENTS INTO CRYPTO-BIOMETRIC PROTECTION OF INFORMATION BASED ON HANDWRITING
Bayanov B.
Expert system applications for industryspecifc information security challenges
Kireeva N., Pozdnyak I., Filippov N.
METHOD FOR MANAGEMENT OF INFORMATION SECURITY IN CORPORATE NETWORKS
Anikin I.
PROCESSING OF RESULTS OF THE EXPERT ASSESSMENT OF DAMAGE TO INFORMATION SYSTEM FOR THE CONCLUSION OF INTEGRATED FUNCTION OF THE ACCESSORY
Dubinin E., Kopytov V., Tebueva F.
SMART CITY TECHNOLOGIES: INFRASTRUCTURE OF THE FUTURE
Erokhina O.
GENERALIZED INVARIANT METHOD MESSAGING AND ASSESSMENT OF ITS INFORMATION SECURITY
Lebedyantsev V.
FEATURES OF MODELING OF MODES EXCITATION OF MULTI-CHANNEL RANDOM ANTENNAS
Zasedateleva P., Maslov O., Ryabushkin A., Scherbakova T.
SIMULATION MODEL FOR RESEARCHING THE USER BEHAVIOR IN DISTRIBUTED INFORMATION COMPUTER SYSTEMS
Ryapolova E., Studyannikova M.
DATA SECURITY AND CONTROLLING INTERRUPTION OF THE DATA COMMUNICATION PATH IN THE SESSION MODE
Mostovoj J., Slepushov I.
ON THE QUESTION OF DETECTION MALWARE THAT USE CUDA TECHNOLOGY
Mostovoi J., Rakhmaev D.
DEVELOPMENT OF A METHOD FOR MONITORING ANAMOUS BEHAVIOR OF A USER IN A DISTRIBUTED INFORMATION COMPUTER SYSTEM: BUILDING A MATHEMATICAL MODEL
Ryapolova E., Presnov A., Tsvetkova K.
HIERARCHICAL STOCHASTIC MODEL FOR MONITORING OF TREAT TO INFORMATION SECURITY OF INFORMATION SYSTEM
Gubareva O., Osipov O., Pugin V.
1 - 29 的 29 信息

检索提示:

  • 检索的名词区分大小写
  • 常用字词将被忽略
  • 默认情况下只有在查询结果满足所有检索词才返回(例如,隐含AND)
  • 使用OR结合多个检索词,便于查找含有这些检索词的文章,例如education OR research
  • 使用括号来创建更复杂的查询; 例如:archive ((journal OR conference) NOT theses)
  • 使用引号检索一个完整的词组; 例如: "open access publishing"
  • 使用-或者NOT排除一个检索词; 例如:online -politics or online NOT politics
  • 在检索词里使用 *作为通配符匹配任何字符序列; 例如., soci* morality 将符合含有 "sociological" or "societal"的词语
##common.cookie##