Author of the publication

Analysis of the Process of Information Transfer from the Source-to-User in Terms of Information Impact (short paper).

, , , , and . CPITS II (2), volume 3188 of CEUR Workshop Proceedings, page 257-264. CEUR-WS.org, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic model of guarantee capacity and cyber security management in the critical automated system., , , , and . CMiGIN, volume 3530 of CEUR Workshop Proceedings, page 102-111. CEUR-WS.org, (2022)Analysis of 2-Isogeny Properties of Generalized Form Edwards Curves., , , , and . CPITS, volume 2746 of CEUR Workshop Proceedings, page 1-13. CEUR-WS.org, (2020)Methodology for Choosing a Consensus Algorithm for Blockchain Technology., , , , and . DECaT, volume 3665 of CEUR Workshop Proceedings, page 106-113. CEUR-WS.org, (2024)Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies., , , , and . CPITS, volume 2746 of CEUR Workshop Proceedings, page 23-32. CEUR-WS.org, (2020)Protecting Objects of Critical Information Infrastructure from Wartime Cyber Attacks by Decentralizing the Telecommunications Network (short paper)., , , , and . CPITS II, volume 3550 of CEUR Workshop Proceedings, page 240-245. CEUR-WS.org, (2023)Modified Delta Maintainability Model of Object-Oriented Software (short paper)., , , , and . CPITS, volume 3288 of CEUR Workshop Proceedings, page 117-124. CEUR-WS.org, (2022)Modeling CSIKE Algorithm on Non-Cyclic Edwards Curves., , , , and . CPITS, volume 3288 of CEUR Workshop Proceedings, page 1-10. CEUR-WS.org, (2022)Jump-Stay Jamming Attack on Wi-Fi Systems., , and . CSIT, page 1-5. IEEE, (2023)Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves., , , , and . CQPC, volume 3504 of CEUR Workshop Proceedings, page 12-25. CEUR-WS.org, (2023)Improving the Security Policy of the Distance Learning System based on the Zero Trust Concept., , , , and . CPITS, volume 3421 of CEUR Workshop Proceedings, page 97-106. CEUR-WS.org, (2023)