Author:
Razumov Pavel V.,Safaryan Olga A.,Smirnov Ivan A.,Porksheyan Vitaliy M.,Boldyrikhin Nickolay V.,Korochentsev Denis A.,Cherckesova Larissa V.,Osikov Sergey A.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. CNN-Based Model for the HTTP Flood Attack Detection;2023 International Conference for Advancement in Technology (ICONAT);2023-01-24
2. Set-Theoretic Operations and Transport Security;Fundamental and Applied Scientific Research in the Development of Agriculture in the Far East (AFE-2022);2023
3. Website Spoofing as Technology of Cyber Attacks on the Computer Systems;Lecture Notes in Networks and Systems;2022-11-16
4. Optimization of Cargo Transportation Resource Allocation Based on Lean Manufacturing;Lecture Notes in Networks and Systems;2022-11-16
5. Modern Hash Collision CyberAttacks and Methods of Their Detection and Neutralization;Journal of Physics: Conference Series;2021-12-01