Author of the publication

Design and verification of a mobile robot based on the integrated model of cyber-Physical systems.

, , , and . Simul. Model. Pract. Theory, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Configuration-Based Approach to Embedded Device Security., , and . MMM-ACNS, volume 7531 of Lecture Notes in Computer Science, page 270-285. Springer, (2012)Methodological Primitives for Phased Construction of Data Visualization Models., , and . J. Internet Serv. Inf. Secur., 5 (4): 60-84 (2015)Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking., , , and . ICDM, volume 8557 of Lecture Notes in Computer Science, page 39-54. Springer, (2014)Computer attack modeling and security evaluation based on attack graphs., and . IDAACS, page 614-619. IEEE, (2013)Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems., , , and . Future Internet, 5 (3): 355-375 (2013)Attack Modelling and Security Evaluation for Security Information and Event Management., , and . SECRYPT, page 391-394. SciTePress, (2012)Dynamical Attack Simulation for Security Information and Event Management., , , and . IF&GIS, page 219-234. Springer, (2013)Social networks analysis by graph algorithms on the example of the VKontakte social network., , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 10 (2): 55-75 (2019)Social networks bot detection using Benford's law., , , , and . SIN, page 19:1-19:8. ACM, (2020)A technique for design of secure data transfer environment: Application for I2C protocol., , and . ICPS, page 789-794. IEEE, (2018)