Ishakov Andrey Yunusovich
Articles:
- Algorithm for applying short-term forecasting for detecting information security incidents through the network traffic analysis
- Engineering of imitation model of a complex network of security systems
- Securing Cisco Systems equipment with access control lists
- Subject verification method based on the trustees mechanism for remote registration