|
|
Publications in Math-Net.Ru
-
Analysis of modern research on protection against adversarial attacks in energy systems
Informatics and Automation, 24:6 (2025), 1751–1809
-
Methodology for assessing the reliability of software-defined networks under computer attacks
Journal of the Belarusian State University. Mathematics and Informatics, 3 (2024), 90–102
-
Anomaly and cyber attack detection technique based on the integration of fractal analysis and machine learning methods
Informatics and Automation, 21:6 (2022), 1328–1358
-
Intelligent system of analytical processing of digital network content for protection against inappropriate information
Informatics and Automation, 20:4 (2021), 755–792
-
Architecture of the parallel Big Data Processing system for security monitoring of Internet of Things networks
Tr. SPIIRAN, 59 (2018), 5–30
-
Dynamic method of searching anthropogenic objects in use of seabed with autonomous underwater vehicles
Tr. SPIIRAN, 58 (2018), 203–226
-
Assessment of cyber-resilience of computer networks based on simulation of cyber attacks by the stochastic networks conversion method
Tr. SPIIRAN, 55 (2017), 160–184
-
Using genetic optimization and visual analysis tools for access schema design in virtual local area networks
Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2015, no. 1, 33–46
-
New generation of security information and event management systems
St. Petersburg Polytechnical University Journal. Computer Science. Telecommunication and Control Sys, 2014, no. 3(198), 7–18
-
The construction of a multi-level intelligent information security system for automated systems of railway transport
Tr. SPIIRAN, 30 (2013), 7–25
-
Mathematical Methods, Models and Architectures for Computer Network Security: the review of perspective research directions according to the results of the International Conference MMM–ACNS–2012
Tr. SPIIRAN, 25 (2013), 148–170
-
Perspective data storage systems for security information monitoring and management
Tr. SPIIRAN, 25 (2013), 113–134
-
Scientific analysis and policy support for cyber security: the review of perspective research directions according to the results of the International Workshop SA&PS4CS 2012
Tr. SPIIRAN, 24 (2013), 66–88
-
Architecture of the system of intelligent information security services in critical infrastructures
Tr. SPIIRAN, 24 (2013), 21–40
-
Methodology of iterative attack modelling in large computer networks
Tr. SPIIRAN, 23 (2012), 50–79
-
Developing the system of intelligent services to protect information in cyber warfare
Tr. SPIIRAN, 22 (2012), 84–100
-
Development of the concept of information security for information and telecommunications systems of the State authorities
Tr. SPIIRAN, 22 (2012), 71–83
-
Methods and tools for attack modeling in large computer networks: state of the problem
Tr. SPIIRAN, 22 (2012), 5–30
-
Method of assessing the level of information protection against unauthorized access in computer networks on the basic of the security graph
Tr. SPIIRAN, 21 (2012), 41–55
-
Dynamic access control to information resources in critical infrastructures based on the user information profiles
Tr. SPIIRAN, 21 (2012), 5–20
-
Application of security information and event management technology for information security in critical infrastructures
Tr. SPIIRAN, 20 (2012), 27–56
-
Structural-logical method of the safety analysis of the potential dangerous objects
Tr. SPIIRAN, 17 (2011), 55–69
-
Network key formation protocol on open communication channels with errors
Tr. SPIIRAN, 14 (2010), 29–49
-
Security management of protected multi-service networks for special purposes
Tr. SPIIRAN, 13 (2010), 182–198
-
Sergey Leonidovich Chernyshev (to Anniversary Since Birth)
Vestnik YuUrGU. Ser. Mat. Model. Progr., 15:2 (2022), 125–127
-
Рудаков Константин Владимирович (21.06.1954 – 10.07.2021). Памяти академика информатики
Vestnik YuUrGU. Ser. Mat. Model. Progr., 15:1 (2022), 128–130
-
Vladimir Evgenievich Pavlovsky (22.05.1950–03.06.2020)
Vestnik YuUrGU. Ser. Mat. Model. Progr., 13:3 (2020), 116–118
-
Analytical review of the reports of the International Workshop «Scientific Analysis and Policy Support for Cyber Security» (SA&PS4CS 2010)
Tr. SPIIRAN, 13 (2010), 226–248
-
Analytical review of talks on the International Conference «Mathematical Methods, Models and Architectures for Computer Network Security» (MMM-ACNS-2010)
Tr. SPIIRAN, 13 (2010), 199–225
© , 2026