Author:
Krasov Andrey,Vitkova Lidia,Pestov Igor
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Methodology for Detecting Anomaly and Attack on Cloud Infrastructure Instances;Proceedings of the Sixth International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’22);2022-10-31
2. Development of a Method for Building a Trusted Environment by Using Hidden Software Agent Steganography;Journal of Physics: Conference Series;2021-11-01
3. Investigation of operating system security mechanisms for vulnerabilities;The 4th International Conference on Future Networks and Distributed Systems (ICFNDS);2020-11-26