Полные тексты документов этой коллекции доступны пользователям сети БГУ.
Ресурсы коллекции (Сортировка по Дата поступления в По убыванию порядке): 1 по 16 из 16
Предварительный просмотр | Дата выпуска | Заглавие | Автор(ы) |
| 2014 | Some extremal properties of the solutions of ordinary differential equations systems | Petrichenko, M. R.; Serow, D. W. |
| 2014 | Mathematical models of complex systems on the basis of artificial neural networks | Vasilyev, A. N.; Tarkhov, D. A. |
| 2014 | Illustrations of irreducibility and tops of umbrellas in the PostScript methodology | Kovalew, I. A.; Serow, D. W. |
| 2014 | Three levels of difficulty in quantitative analyzing the results of real measuring regression experiments | Chebrakov, Yu. V. |
| 2014 | A finite-state model of botnets’ desinfection and removal | Zegzhda, D. P.; Stepanova, T. V. |
| 2014 | Approach to assessment of measures sufficiency of confidential information protection | Suprun, A. F. |
| 2014 | Efficiency estimation of the protection software for neutralization and elimination of botnets | Zegzhda, D. P.; Stepanova, T. V. |
| 2014 | Dimension reduction in network attacks detection systems | Platonov, V. V.; Semenov, P. O. |
| 2014 | Analysis of hidden field equations cryptosystem over odd-characteristic fields | Kuzmina, N. G.; Makhovenko, E. B. |
| 2014 | Formalization of objectives of grid systems resources protection against unauthorized access | Kalinin, M. O.; Konoplevy, A. S. |
| 2014 | Reflexive control over intruder using deception systems | Lavrova, D. S.; Pavlenko, E. Y.; Pechenkinz, A. I. |
| 2014 | Formal security model for virtual machine hypervisors in cloud computing systems | Zegzhda, D. P.; Nikolsky, A. V. |
| 2014 | Using principles of fractal image compression for complexity estimation of the face recognition problem | Moskvin, D. A.; Gluhov, V. V. |
| 2014 | On Boolean ideals and varieties with application to algebraic attacks | Rostovtsev, A. G.; Mizyukin, A. A. |
| 2014 | Strengthening differential and linear attacks using virtual isomorphisms | Rostovtsev, A. G.; Suprun, A. F. |
| 2014 | Modern problems of cybersecurity | Vasiliev, Y. S.; Zegzhda, P. D.; Kuvshinov, V. I. |
Ресурсы коллекции (Сортировка по Дата поступления в По убыванию порядке): 1 по 16 из 16