|
|
Publications in Math-Net.Ru
-
Complex of models for network security assessment of industrial automated control systems
Tr. SPIIRAN, 19:3 (2020), 621–643
-
A Study and Selection of Cryptographic Standards on the basis of Text Mining
Tr. SPIIRAN, 48 (2016), 69–87
-
Cloud computing security perimeter
Program Systems: Theory and Applications, 6:1 (2015), 61–71
-
Analytical Model for Protecting Documentary File Formats from Unauthorized Access
Tr. SPIIRAN, 43 (2015), 228–252
-
Application of Binary Trees for the IDS Events Aggregation Task
Tr. SPIIRAN, 40 (2015), 110–121
-
Research of combined “Denial of Service” attacks
Tr. SPIIRAN, 32 (2014), 199–209
-
Estimation of traffic spectrum characteristics in the problem of various computer attacks detection
Tr. SPIIRAN, 30 (2013), 56–64
-
Exposition of computer facilities in the museum of SPIIRAS history
Tr. SPIIRAN, 26 (2013), 401–416
-
Research of computer attacks by means of the observed traffic singular spectrum analysis
Tr. SPIIRAN, 26 (2013), 101–114
-
Measurement of program code security
Tr. SPIIRAN, 26 (2013), 91–100
-
Attack detection by means of singular spectrum analysis
Tr. SPIIRAN, 25 (2013), 135–147
-
Correlation analysis of abnormal network traffic
Tr. SPIIRAN, 23 (2012), 93–99
-
Model of attack detection on the basis of time series analysis
Tr. SPIIRAN, 21 (2012), 71–79
-
Nature and modeling of network anomalies
Tr. SPIIRAN, 5 (2007), 260–267
© , 2024