List of articles
Electronics, radio engineering and communications
Management, computer science and informatics
Methodology for assessing the security of information systems built using virtualization technologies
Kurnosov K. V.
|
37–44
|
Influence of inertia group of the S-box on the differential characteristic of the box cipher
Grigoryan D. R., Ngi N. V.
|
45–49
|
Continuous optimization using a hybrid model of cellular automata and learning automata
Evsyutin O. O., Shelupanov A. A., Babishin V. D., Cosedko K. A.
|
50–54
|
Providing QoS based on the OLSR routing protocol: problems, algorithms and solutions
Scherba E. V., Litvinov G. A.
|
55–65
|
Implementation algorithms for the methods of personal data depersonalization in distributed information systems
Mischenko E. Yu., Sokolov A. N.
|
66–70
|
Neural networks with polynomial piecewise-continuous activation functions for the problems of finding data patterns
Nguen A. T., Korikov A. M.
|
71–76
|
Business and user requirements patterns for engineering and manufacturing type software
Ehlakov Yu. P.
|
77–82
|
Depth estimation based on convolutional neural networks
Chugunov R. A., Kulnevich A. D., Aksenov S. V.
|
83–86
|
Electrical engineering