Search

Your search keyword '"Anton Konev"' showing total 39 results

Search Constraints

Start Over You searched for: Author "Anton Konev" Remove constraint Author: "Anton Konev"
39 results on '"Anton Konev"'

Search Results

1. Gravitational Search For Designing A Fuzzy Rule-Based Classifiers For Handwritten Signature Verification

2. Representation Learning for EEG-Based Biometrics Using Hilbert–Huang Transform

3. Neural Network-Based Price Tag Data Analysis

4. A Survey on Threat-Modeling Techniques: Protected Objects and Classification of Threats

5. Adversarial Attacks Impact on the Neural Network Performance and Visual Perception of Data under Attack

6. The Comparison of Cybersecurity Datasets

7. Implementation and Evaluation of Nodal Distribution and Movement in a 5G Mobile Network

8. IoT Security Mechanisms in the Example of BLE

9. Mathematical Model for Choosing Counterparty When Assessing Information Security Risks

10. Generation of an EDS Key Based on a Graphic Image of a Subject’s Face Using the RC4 Algorithm

11. Metric of Highlighting the Synchronicity of Time Series and Its Application in Analyzing the Fundamental Frequencies of the Speaker’s Speech Signal

12. Information Security Methods—Modern Research Directions

13. A Fuzzy Classifier with Feature Selection Based on the Gravitational Search Algorithm

16. A review on security analysis of cyber physical systems using Machine learning

21. Threat Model for Trusted Sensory Information Collection and Processing Platform

22. Information Security Subsystem Model for a Trusted Platform for Collecting and Processing Sensory Information

24. Model of the life cycle of the information security system

25. Speech Signal Segmentation into Vocalized and Unvocalized Segments on the Basis of Simultaneous Masking

27. Building a model of infringer

29. Gravitational Search For Designing A Fuzzy Rule-Based Classifiers For Handwritten Signature Verification

30. Computer network threat modelling

32. Applying the principle of distribution in the program complex for vocal recognition

33. Modeling threats to information security using IDEF0 methodology

36. Software for Speech Signal Research in Patients with Malignant Diseases of the Throat

37. Mathematical model of threats to information systems

39. A medical hardware complex for speech signal research in patients with phonation disorders

Catalog

Books, media, physical & digital resources