16 results on '"Anton Konev"'
Search Results
2. Speech frame implementation for speech analysis and recognition.
3. Neural Network-Based Price Tag Data Analysis.
4. The Comparison of Cybersecurity Datasets.
5. A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats.
6. Adversarial Attacks Impact on the Neural Network Performance and Visual Perception of Data under Attack.
7. Representation Learning for EEG-Based Biometrics Using Hilbert-Huang Transform.
8. Implementation and Evaluation of Nodal Distribution and Movement in a 5G Mobile Network.
9. Generation of an EDS Key Based on a Graphic Image of a Subject's Face Using the RC4 Algorithm.
10. IoT Security Mechanisms in the Example of BLE.
11. A Model of Threats to the Confidentiality of Information Processed in Cyberspace Based on the Information Flows Model.
12. Metric of Highlighting the Synchronicity of Time Series and Its Application in Analyzing the Fundamental Frequencies of the Speaker's Speech Signal.
13. Application of the Gravitational Search Algorithm for Constructing Fuzzy Classifiers of Imbalanced Data.
14. Information Security Methods - Modern Research Directions.
15. Model of Threats to Computer Network Software.
16. A Fuzzy Classifier with Feature Selection Based on the Gravitational Search Algorithm.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.