检索

标题
作者
The Modeling of Processes of Design of Information Protection Systems in Financial Information Systems
Prokushev Y., Ponomarenko S., Maksimov R.
A Refined Method for Analytical Modeling of the Processes of Spreading Virus Software to Assess the Security of Informatization Objects
Zavodtsev I., Borisov M., Bondarenko N., Meleshko V.
The Modeling of Processes of Design of Information Protection Systems in Critical Information Infrastructures
Prokushev Y., Ponomarenko S., Shishov N.
The modeling of information security system design processes in state information systems
Prokushev Y., Ponomarenko S., Ponomarenko S.
Mathematical Model of Economic Information
Shamin R., Grosheva P., Golovanov S.
Conceptual model of choice of hardware and software protection
Prokushev Y., Maliy J.
Modeling Information Security Threats and Determination of Their Relevance for Information Systems of Informatization Objects of Federal Executive Authorities
Zavodtsev I., Borisov M., Bondarenko N., Meleshko V.
AUTOMATION OF DESIGN PROCESSES WHEN CREATING AND OPERATING SPECIAL CARS
Kuklina I.
Aspects of modernization of ITSM class information system in software development companies: microservice architecture of the search module of the system
Smirnov M., Mityakov E., Makhov A.
Electronic Library System by Means of Object-Oriented PYTHON Programming
Epifantseva V., Efremov S., Nesterenko I.
Tri-State+ Communication Symmetry Using the Algebraic Approach
Gerck E.
Using graphs to identify asset security compromises
Grineva N.
On the Physical Representation of Quantum Systems
Gerck E.
Oil Pollution Detection in Aquatic Ecosystems Using UAVS and Multispectral Imaging Based on Deep Learning Technologies
Gladkikh T.
Determination of Parameters of Hidden Threats of Early Detection in Information Systems for Machine Learning Tasks
Zolotukhina M., Zykov S.
Cloud Technology Security
Bespalova N.
Software and Hardware Complex for Investigation of Technical Channels of Information Leakage Based on High-frequency Irradiation Method
Porkhun A., Dushkin A., Meshcheryakov R., Savchenko Y., Shcherbakov V.
Integration Approach to Documentation Based on Metagraphs
Seliverstova A., Vinogradova M., Loseva S., Gapanyuk Y.
Determination of the weight of audit evidence by the method of point ratings in the information security audit
Voevodin V., Markina M., Markin P.
Algorithm and Software for Increasing Energy Efficiency of Power Supply Sources Based on Digital Technologies
Siddikov I., Abdumalikov A., Tozhiev A., Lezhnina Y.
Development of an Automated Information System for Calculating the Movement of a High-speed Small-sized Body
Shalaginova O., Stakhno R., Gonchar A.
Synthesis methods for controlling multiscale processes with predictive models with incomplete information
Nguyen K., Zhilenkov A., Dang B.
Visualization of Microservices-based Information System Architectures Using OpenTelemetry Data
Kornienko D., Nikulin A.
Ensuring reach ability and stability in the synthesis of robust discrete model predictive control in conditions of incomplete information
Nguyen K., Zhilenkov A., Dang B.
1 - 24 的 24 信息

检索提示:

  • 检索的名词区分大小写
  • 常用字词将被忽略
  • 默认情况下只有在查询结果满足所有检索词才返回(例如,隐含AND)
  • 使用OR结合多个检索词,便于查找含有这些检索词的文章,例如education OR research
  • 使用括号来创建更复杂的查询; 例如:archive ((journal OR conference) NOT theses)
  • 使用引号检索一个完整的词组; 例如: "open access publishing"
  • 使用-或者NOT排除一个检索词; 例如:online -politics or online NOT politics
  • 在检索词里使用 *作为通配符匹配任何字符序列; 例如., soci* morality 将符合含有 "sociological" or "societal"的词语