From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Distributed Packet Trace Processing Method for Information Security Analysis., , , и . NEW2AN, том 8638 из Lecture Notes in Computer Science, стр. 535-543. Springer, (2014)GBMILs: Gradient Boosting Models for Multiple Instance Learning., , , и . ICR, том 14214 из Lecture Notes in Computer Science, стр. 233-245. Springer, (2023)Communication Technologies in the Space Experiment "Kontur-2"., , , и . NEW2AN, том 10531 из Lecture Notes in Computer Science, стр. 587-597. Springer, (2017)Firewall Configuration based on Specifications of Access Policy and Network Environment., и . Security and Management, стр. 146-151. CSREA Press, (2010)Cyber-Physical Approach in a Series of Space Experiments "Kontur"., , и . NEW2AN, том 9247 из Lecture Notes in Computer Science, стр. 745-758. Springer, (2015)Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy., и . Security and Management, стр. 603-608. CSREA Press, (2009)Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation., , , и . Security and Management, стр. 30-35. CSREA Press, (2010)Database Acquisition for the Lung Cancer Computer Aided Diagnostic Systems., , , , и . FRUCT, стр. 220-227. IEEE, (2019)Network Complexity: Cross-Layer Models and Characteristics., , и . AICT, стр. 16. IEEE Computer Society, (2007)Method of security against computer attacks based on an analysis of executable machine code., и . Autom. Control. Comput. Sci., 49 (8): 705-708 (2015)