Search Results - "Control structures and microprogramming"

Refine Results
  1. 1
  2. 2

    Erratum to: A Novel Coal Mine Dust Measurement System and Experimental Analysis by Yu, Bencheng, Zihui, Ren, Shoufeng, Tang

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.10.2023
    Published in Automatic control and computer sciences (01.10.2023)
    “…An Erratum to this paper has been published: https://doi.org/10.3103/S0146411623050139…”
    Get full text
    Journal Article
  3. 3

    Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code by Kosolapov, Y. V.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2022
    Published in Automatic control and computer sciences (01.12.2022)
    “…An Erratum to this paper has been published: https://doi.org/10.3103/S0146411622070094…”
    Get full text
    Journal Article
  4. 4

    Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network by Prabhat Kumar, Gupta, Govind P., Tripathi, Rakesh

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.03.2021
    Published in Automatic control and computer sciences (01.03.2021)
    “…With increase in the demand for Internet of Things (IoT)-based services, the capability to detect anomalies such as malicious control, spying and other threats…”
    Get full text
    Journal Article
  5. 5
  6. 6
  7. 7

    Fundamental Approaches to Software Engineering: 28th International Conference, FASE 2025, Held as Part of the International Joint Conferences on Theory and Practice of Software, ETAPS 2025, Hamilton, ON, Canada, May 3–8, 2025, Proceedings

    ISBN: 9783031909009, 3031909003, 3031908996, 9783031908996
    Published: Cham Springer Nature 2025
    “…This open access book constitutes the proceedings of the 28th International Conference on Fundamental Approaches to Software Engineering, FASE 2025, which was…”
    Get full text
    eBook
  8. 8

    The Algorithms for the Eulerian Cycle and Eulerian Trail Problems for a Multiple Graph by Smirnov, A. V.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…In this article, we consider undirected multiple graphs of any natural multiplicity k > 1. A multiple graph contains edges of three types: ordinary edges,…”
    Get full text
    Journal Article
  9. 9

    Requirement Patterns in Deductive Verification of poST Programs by Chernenko, I. M., Anureev, I. S., Garanina, N. O.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…Process-oriented programming is one of the approaches used to develop control software. A process-oriented program is defined as a sequence of processes. Each…”
    Get full text
    Journal Article
  10. 10

    Detecting Defects in Multicomponent Software Using a Set of Universal Graph Representations of the Code by Kubrin, G. S., Zegzhda, D. P.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…A comparison of the existing software analysis methods is presented with an assessment of the possibility of identifying defects contained in several…”
    Get full text
    Journal Article
  11. 11

    On the Method of Masking in the Multiple Signature Protocol Based on Isogenies of Elliptic Curves by Aleksandrova, E. B., Kostin, S. O.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…Among the post-quantum algorithms selected by the National Institute of Standards and Technology (NIST) for standardization, the main mathematical apparatus is…”
    Get full text
    Journal Article
  12. 12

    Study of a Radar Sensor Transmitter to Optimize a Bipolar Ultrawideband Pulse Used to Excite the Antenna by Aristov, V., Greitans, M.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…The desire to increase the energy of the pulses by which the impact excitation of ultrawideband antennas is carried out prompts some authors of equipment…”
    Get full text
    Journal Article
  13. 13

    Model for Ranking the System of Indicators of Node Compromise of Corporate Data Network Nodes by Bezzateev, S. V., Mylnikov, V. A., Starodub, A. R.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…The model of the system of ranking indicators of compromise for active countermeasures against targeted attacks is proposed, which makes it possible to detect…”
    Get full text
    Journal Article
  14. 14

    Detecting Attacks Using Artificial Neural Networks by Sikarev, I. A., Tatarnikova, T. M.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…The developed neural network attack detection algorithm, whose peculiarity lies in the possibility of launching two parallel processes, is described: searching…”
    Get full text
    Journal Article
  15. 15

    Intelligent Synthesis of Cyber-Resilient Network Structures: Methods, Experiments, and Architecture Implementation by Pavlenko, E. Yu

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…This paper studies issues related to the implementation of intellectual synthesis of cyber-resilient structures. Methods are proposed that implement synthesis…”
    Get full text
    Journal Article
  16. 16

    Detecting Malware Using Deep Neural Networks by Ovasapyan, T. D., Volkovskii, M. A., Makarov, A. S.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…This article proposes a method for detecting malicious executable files by analyzing disassembled code. This method is based on a static analysis of assembler…”
    Get full text
    Journal Article
  17. 17

    Analysis of the Reliability of Template Storage When Implementing Modern Biometric Technologies in Information Security Systems by Safiullina, L. Kh, Kasimova, A. R., Alekseeva, A. A.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…It can be argued that in certain areas of information technology, classical systems of authentication of the user of a computer system based on passwords and…”
    Get full text
    Journal Article
  18. 18

    Probability-Theoretical Models of Physical Random Number Generators by Bogdanov, D. S., Logachev, A. S., Mironkin, V. O.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…— This article presents the main probability-theoretic models that describe a wide class of physical random number generators and allow us to propose general…”
    Get full text
    Journal Article
  19. 19

    Protection Against Unauthorized Access of Mobile Devices When Using the BYOD Concept by Kornienko, A. A., Kornienko, S. V., Razzhivin, N. S.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…The problems of using mobile devices in the work process of an organization when applying the BYOD concept are analyzed. An adapted methodology for assessing…”
    Get full text
    Journal Article
  20. 20

    Protection of Ad Hoc Networks against Distributed Network Scanning by Pakhomov, M. A.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2024
    Published in Automatic control and computer sciences (01.12.2024)
    “…The peculiarities of network scanning of self-organizing networks are studied, and the methods for its detection are analyzed. A modification of the hybrid…”
    Get full text
    Journal Article