Author of the publication

Using preventive measures for the purpose of assuring information security of wireless communication channels.

, , , , , and . FRUCT, page 167-173. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mechanism of establishing authorship of short messages posted by users of internet portals by methods of mathematical linguistics.. Automatic Control and Computer Sciences, 49 (8): 813-819 (2015)Information Security State Analysis of Elements of Industry 4.0 Devices in Information Systems., , and . NEW2AN/ruSMART, volume 12525 of Lecture Notes in Computer Science, page 119-125. Springer, (2020)An Approach to Selecting an Informative Feature in Software Identification., , , and . NEW2AN, volume 11118 of Lecture Notes in Computer Science, page 318-327. Springer, (2018)Using preventive measures for the purpose of assuring information security of wireless communication channels., , , , , and . FRUCT, page 167-173. IEEE, (2016)Analysis of the state of information security on the basis of surious emission electronic components., , , , and . FRUCT, page 216-221. IEEE, (2017)Identification of Anomalies in the Operation of Telecommunication Devices Based on Local Signal Spectra., , , and . Autom. Control. Comput. Sci., 54 (8): 1001-1006 (2020)Software Identification by Standard Machine Learning Tools., , and . Autom. Control. Comput. Sci., 55 (8): 1175-1179 (2021)Application of Ensembles of Neural Networks Trained on Unbalanced Samples for Analyzing Statuses of IoT Devices., and . Autom. Control. Comput. Sci., 55 (8): 1136-1141 (2021)Identification of Abnormal Functioning of Devices of Cyber-Physical Systems., , and . NEW2AN/ruSMART, volume 12525 of Lecture Notes in Computer Science, page 3-10. Springer, (2020)Implementation of symmetric encryption by State Standard 28147-89 algorithm on a graphical processor., and . Automatic Control and Computer Sciences, 50 (8): 792-795 (2016)