164 results on '"Kalinin, A O."'
Search Results
2. Life cycle models and security threats to a microcircuit during its development and operation
3. Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems
4. Protection of Computational Machine Learning Models against Extraction Threat
5. Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory
6. A Decentralized Approach to Intrusion Detection in Dynamic Networks of the Internet of Things Based on Multiagent Reinforcement Learning with Interagent Interaction
7. A Potentiometric Sensor for Cesium Ions with a Film Membrane Based on Dibenzo-21-Crown-7
8. Strontium-Selective Sensors with Di-tert-butyldicyclohexano-18-crown-6 Membranes
9. Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure
10. Mathematical Model of the Spread of Computer Attacks on Critical Information Infrastructure
11. Analysis of a Huge Amount of Network Traffic Based on Quantum Machine Learning
12. Application of Neuro-Fuzzy Inference to Detect Network Scanning
13. Conceptual Data Modeling Using Aggregates to Ensure Large-Scale Distributed Data Management Systems Security
14. Synthesis and Analytical Characteristics of New Membrane Materials for Thallium(I) Selective Sensors
15. Computational method for constructing the time delay distribution function for a closed loop control of the system dynamic parameters
16. Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm
17. Modeling Big Data Management Systems in Information Security
18. Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
19. Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems
20. Big Data Management System Security Threat Model
21. Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users
22. Using Neural Networks to Detect Internal Intruders in VANETs
23. Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence
24. Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series
25. Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security
26. Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks
27. Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model
28. Conceptual Data Modeling Using Aggregates to Ensure Large-Scale Distributed Data Management Systems Security
29. Resonances in Spherical Dynamos and Super-Flares
30. Access control system for distributed computing networks
31. Tasks of providing information security in distributed computing networks
32. Technology of security services virtualization for high-speed computer networks
33. Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates
34. Security Modeling of Grid Systems Using Petri Nets
35. Intellectual Intrusion Detection with Sequences Alignment Methods
36. Clarifying Integrity Control at the Trusted Information Environment
37. A New Approach to Security Evaluation of Operating Systems
38. Vulnerabilities Detection in the Configurations of MS Windows Operating System
39. Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment
40. Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters
41. Automatic security management of computer systems
42. Access control method in distributed grid computing networks
43. Logical Resolving for Security Evaluation
44. Optimization of electronic document management systems by means of encoding and visualization of stored data in the integrated development environment
45. “HUMAN LIBRARY” AS A FORM OF CAREER GUIDANCE IN HIGHER FORMS OF SECONDARY SCHOOL
46. Computational intelligence technologies stack for protecting the critical digital infrastructures against security intrusions
47. Features of Calculating the Noise Immunity of UWB Radiosystems in the INDOOR Mode
48. Cohomology of Real Algebraic Varieties
49. Value of indicators of longitudinal deformation of the left atrium in patients with chronic heart failure
50. Heavy Metals in the Water and Bottom Sediments of the Selenga River Delta
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.