List of articles
Electronics, radio engineering and communications
Management, computer science and informatics
Network anomaly detection in the Microsoft Windows system logs using machine learning methods
Pavlychev A. V., Soldatov K. S., Skazin V. A.
|
27–32
|
Key generation and distribution schemes classification for quantum key distribution networks of arbitrary topology
Zhilyaev A. E.
|
33–39
|
Network Anomaly Detection Based on Artificial Immune System for Industrial Internet of Things
Vasiliev V. I., Gvozdev V. E., Shamsutdinov R. R.
|
40–45
|
Application security metrics when using defense system against vulnerabilities based on return-oriented programming
Lubkin I. A.
|
46–51
|
Assessment of employee reliability in the human resources of the enterprise
Shelupanov A. A., Gluhareva S. V., Nemirovich-Danchenko M. M.
|
52–57
|
Topic Modeling in the Context of Medical Texts
Zemlyanskiy S. A., Aksyonov S. V., Lyzin I. A., Berestneva O. G.
|
58–64
|
Evaluation system for electronic educational-methodical complexes of disciplines
Gorodovich A. V., Kruchinin V. V., Perminova M. Yu.
|
65–72
|
Methodology and software for atmospheric correction of images obtained with unmanned aircraft to allow the safe location of vegetation
Kataev M. Yu., Kartashov E. Yu., Smirnov D. S.
|
73–78
|
Selection of a sliding mode controller for an automated transport system
Tran V. T., Korikov A. M., Nguen T. T.
|
79–84
|
Knowledge base for coefficients of k-power on generating functions in two variables
Kruchinin D. V.
|
85–89
|