19 results on '"Alexander A. Pechenkin"'
Search Results
2. Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection.
3. Integer overflow vulnerabilities detection in software binary code.
4. Modeling of information systems to their security evaluation.
5. An Approach to the Programs Security Analysis using Vector Representation of Machine Code.
6. A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems.
7. An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code.
8. Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence.
9. Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security.
10. Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing.
11. Intelligent data analysis in decision support systems for penetration tests.
12. Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems.
13. Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster.
14. Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols.
15. Adaptive reflexivity threat protection.
16. Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster.
17. Applying correlation analysis methods to control flow violation detection in the internet of things.
18. Applying Correlation and Regression Analysis Methods for Security Incidents Detection in the Internet of Things.
19. Operationalism as the Philosophy of Soviet Physics: The Philosophical Backgrounds of L. I. Mandelstam and His School.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.