Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The General Concept of a Distributed Computer System Designed for Monitoring Rock Movements., and . CN, volume 39 of Communications in Computer and Information Science, page 280-291. Springer, (2009)Guest Editorial Special Section on Distributed Computer Systems in Industry., , and . IEEE Trans. Ind. Informatics, 9 (1): 181 (2013)Resilient Computer Systems Development for Cyberattacks Resistance., , , , and . IntelITSIS, volume 2853 of CEUR Workshop Proceedings, page 353-361. CEUR-WS.org, (2021)Pessimistic Useful Efficiency of EPL Network Cycle.. CN, volume 79 of Communications in Computer and Information Science, page 297-305. Springer, (2010)Method for identifying cyberattacks based on the use of social engineering over the phone., , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 318-329. CEUR-WS.org, (2024)Methods of improving security and resilience of VR systems' architecture., , , and . IntelITSIS, volume 3675 of CEUR Workshop Proceedings, page 285-304. CEUR-WS.org, (2024)Analysis of real-time systems using convolution of probability mass function., , , and . ETFA, page 1-4. IEEE, (2012)Interpretation of Dual Peak Time Signal Measured in Network Systems., , and . CN, volume 79 of Communications in Computer and Information Science, page 141-152. Springer, (2010)The Approach for IoT Malware Detection Based on Opcodes Sequences Pattern Mining., , , , , , and . IDAACS, page 779-784. IEEE, (2021)Reliability Analysis of M2M Cyclic Data Transfer based on ad-hoc Wireless P2P Link., , and . IEEE Big Data, page 5048-5056. IEEE, (2023)