Author of the publication

Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects.

, , , , and . Autom. Control. Comput. Sci., 51 (8): 824-828 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks., , and . Autom. Control. Comput. Sci., 52 (8): 936-944 (2018)Automatic security management of computer systems., and . Autom. Control. Comput. Sci., 49 (8): 665-672 (2015)Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security., , , and . Autom. Control. Comput. Sci., 52 (8): 965-970 (2018)AI-based Security for the Smart Networks., and . SIN, page 22:1-22:4. ACM, (2020)Integer overflow vulnerabilities detection in software binary code., , and . SIN, page 101-106. ACM, (2017)Security Modeling of Grid Systems Using Petri Nets., , , and . MMM-ACNS, volume 7531 of Lecture Notes in Computer Science, page 299-308. Springer, (2012)A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems., , , , and . Autom. Control. Comput. Sci., 52 (8): 918-930 (2018)Network security architectures for VANET., , , and . SIN, page 73-79. ACM, (2017)Detecting Android application malicious behaviors based on the analysis of control flows and data flows., , , and . SIN, page 280-283. ACM, (2017)Modeling of information systems to their security evaluation., , , and . SIN, page 295-298. ACM, (2017)