How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
Citations since 2017
17 Research Items
The use of data mining technologies, including neural networks, has become widespread in cybersecurity. Outdated approaches for analyzing and identifying rule- or template-based attacks do not always produce the desired result. Successful implementation of a cyber-attack can lead not only to disruption of the information system, but also to potenti...
Open and free cyberspace increases the freedom of people and social communications, in such conditions it becomes especially important to search for new possibilities of ensuring the state security in view of the formation of a new confrontation field - cyberspace. It is important to analyze the actual problems of information security, actions of t...
The determining factor for success during modern warfare is the struggle for supremacy in the air. The main task for a defending side is to prevent the enemy's superiority in the air. Various means of destruction are used for this purpose. A criterion to avoid enemy's superiority in the air is considered to be the assigned balance of aviation by pa...
In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or wireless local area networks (WLANs), not taking into account the great potential offered by ad hoc...
The article highlighted the advantage of information systems in front of centralized systems in terms of ensuring the security of network infrastructure, data transmitted, and procedures used in the software environment of the complex. It was pointed out the technical simplicity of the methods of expansion of information systems and, accordingly, t...