Author:
Sukhoparov M. E.,Lebedev I. S.
Subject
Signal Processing,Control and Systems Engineering,Software
Reference20 articles.
1. Gao, D., Reiter, M., and Song, D., Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance, IEEE Trans. Dependable Secure Comput., 2009, vol. 6, no. 2, pp. 96–110. https://doi.org/10.1109/TDSC.2008.39
2. Devesh, M., Kant, A.K., Suchit, Y.R., Tanuja, P. and Kumar, S.N., Fruition of CPS and IoT in context of Industry 4.0, Intelligent Communication, Control and Devices, Choudhury, S., Mishra, R., Mishra, R.G., and Kumar, A., Eds., Advances in Intelligent Systems and Computing, vol. 989, Singapore: Springer, 2020, pp. 367–375. https://doi.org/10.1007/978-981-13-8618-3_39
3. Amosov, O.S., Magola, D.S., and Baena, S.G., Network classification of information security attacks based on intelligent technologies, fractal and wavelet analysis, Uch. Zap. Komsomol’skogo-Na-Amure Gos.
Tekh. Univ., 2017, vol. 1, no. 4, pp. 19–29.
4. Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D., and Kalinin, M.O., Application model of modern artificial neural network methods for the analysis of information systems security, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 965–970. https://doi.org/10.3103/S0146411618080072
5. Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976. https://doi.org/10.3103/S0146411618080084