Author of the publication

Using preventive measures for the purpose of assuring information security of wireless communication channels.

, , , , , and . FRUCT, page 167-173. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research availability of devices based on wireless networks., , , and . FRUCT, page 27-32. IEEE, (2016)The method of elf-files identification based on the metric classification algorithms., , , and . FRUCT, page 397-403. IEEE, (2016)The model of the attack implementation on wireless sensor networks., , and . FRUCT, page 187-194. IEEE, (2017)Identification of executable files on the basis of statistical criteria., , and . FRUCT, page 202-208. IEEE, (2017)Machine Learning based Prediction Method of Pollution Concentration in the Atmosphere., , , , , , and . MetroInd4.0&IoT, page 71-76. IEEE, (2021)Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network., , , , , , , , , and . WWIC, volume 9674 of Lecture Notes in Computer Science, page 297-308. Springer, (2016)The Analysis of Abnormal Behavior of the System Local Segment on the Basis of Statistical Data Obtained from the Network Infrastructure Monitoring., , , , , , and . NEW2AN, volume 9870 of Lecture Notes in Computer Science, page 503-511. Springer, (2016)Using preventive measures for the purpose of assuring information security of wireless communication channels., , , , , and . FRUCT, page 167-173. IEEE, (2016)An Approach to Selecting an Informative Feature in Software Identification., , , and . NEW2AN, volume 11118 of Lecture Notes in Computer Science, page 318-327. Springer, (2018)