Author of the publication

Testing of the hypothesis in the research of computer incidents on the basis of the analysis of attributes and their values.

, , , and . FRUCT, page 352-357. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research availability of devices based on wireless networks., , , and . FRUCT, page 27-32. IEEE, (2016)Implementation White Box Cryptography in Substitution-Permutation network., , and . MECO, page 1-3. IEEE, (2020)Ensuring data integrity using blockchain technology., , , , and . FRUCT, page 534-539. IEEE, (2017)Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network., , , , , , , , , and . WWIC, volume 9674 of Lecture Notes in Computer Science, page 297-308. Springer, (2016)Implementation White-Box Cryptography for Elliptic Curve Cryptography., , and . MECO, page 1-4. IEEE, (2021)Formalization of the feature space for detection of attacks on wireless sensor networks., , , and . FRUCT, page 526-533. IEEE, (2017)The method of classification of user and system data based on the attributes., , and . FRUCT, page 404-409. IEEE, (2016)Spline-Wavelet Bent Robust Codes., , and . FedCSIS, volume 18 of Annals of Computer Science and Information Systems, page 227-230. (2019)The method of elf-files identification based on the metric classification algorithms., , , and . FRUCT, page 397-403. IEEE, (2016)Trust and Reputation Mechanisms for Multi-agent Robotic Systems., , and . NEW2AN, volume 8638 of Lecture Notes in Computer Science, page 106-120. Springer, (2014)