11 results on '"Alexander A. Pechenkin"'
Search Results
2. A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems.
3. An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code.
4. Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence.
5. Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security.
6. Intelligent data analysis in decision support systems for penetration tests.
7. Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster.
8. Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols.
9. Adaptive reflexivity threat protection.
10. Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster.
11. Applying correlation analysis methods to control flow violation detection in the internet of things.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.