Search Results - "Control structures and microprogramming"
-
1
Erratum to: Cluster Based QOS-Routing Protocol for VANET in Highway Environment
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)Get full text
Journal Article -
2
Erratum to: A Novel Coal Mine Dust Measurement System and Experimental Analysis
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.10.2023Published in Automatic control and computer sciences (01.10.2023)“…An Erratum to this paper has been published: https://doi.org/10.3103/S0146411623050139…”
Get full text
Journal Article -
3
Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2022Published in Automatic control and computer sciences (01.12.2022)“…An Erratum to this paper has been published: https://doi.org/10.3103/S0146411622070094…”
Get full text
Journal Article -
4
Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.03.2021Published in Automatic control and computer sciences (01.03.2021)“…With increase in the demand for Internet of Things (IoT)-based services, the capability to detect anomalies such as malicious control, spying and other threats…”
Get full text
Journal Article -
5
Erratum to: Application on Cold Chain Logistics Routing Optimization Based on Improved Genetic Algorithm
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.11.2019Published in Automatic control and computer sciences (01.11.2019)Get full text
Journal Article -
6
Erratum to: Estimating the Speed of an Integrated Wireless Network for Transportation Applications
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.09.2019Published in Automatic control and computer sciences (01.09.2019)Get full text
Journal Article -
7
Fundamental Approaches to Software Engineering: 28th International Conference, FASE 2025, Held as Part of the International Joint Conferences on Theory and Practice of Software, ETAPS 2025, Hamilton, ON, Canada, May 3–8, 2025, Proceedings
ISBN: 9783031909009, 3031909003, 3031908996, 9783031908996Published: Cham Springer Nature 2025“…This open access book constitutes the proceedings of the 28th International Conference on Fundamental Approaches to Software Engineering, FASE 2025, which was…”
Get full text
eBook -
8
The Algorithms for the Eulerian Cycle and Eulerian Trail Problems for a Multiple Graph
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…In this article, we consider undirected multiple graphs of any natural multiplicity k > 1. A multiple graph contains edges of three types: ordinary edges,…”
Get full text
Journal Article -
9
Requirement Patterns in Deductive Verification of poST Programs
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…Process-oriented programming is one of the approaches used to develop control software. A process-oriented program is defined as a sequence of processes. Each…”
Get full text
Journal Article -
10
Detecting Defects in Multicomponent Software Using a Set of Universal Graph Representations of the Code
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…A comparison of the existing software analysis methods is presented with an assessment of the possibility of identifying defects contained in several…”
Get full text
Journal Article -
11
On the Method of Masking in the Multiple Signature Protocol Based on Isogenies of Elliptic Curves
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…Among the post-quantum algorithms selected by the National Institute of Standards and Technology (NIST) for standardization, the main mathematical apparatus is…”
Get full text
Journal Article -
12
Study of a Radar Sensor Transmitter to Optimize a Bipolar Ultrawideband Pulse Used to Excite the Antenna
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…The desire to increase the energy of the pulses by which the impact excitation of ultrawideband antennas is carried out prompts some authors of equipment…”
Get full text
Journal Article -
13
Model for Ranking the System of Indicators of Node Compromise of Corporate Data Network Nodes
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…The model of the system of ranking indicators of compromise for active countermeasures against targeted attacks is proposed, which makes it possible to detect…”
Get full text
Journal Article -
14
Detecting Attacks Using Artificial Neural Networks
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…The developed neural network attack detection algorithm, whose peculiarity lies in the possibility of launching two parallel processes, is described: searching…”
Get full text
Journal Article -
15
Intelligent Synthesis of Cyber-Resilient Network Structures: Methods, Experiments, and Architecture Implementation
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…This paper studies issues related to the implementation of intellectual synthesis of cyber-resilient structures. Methods are proposed that implement synthesis…”
Get full text
Journal Article -
16
Detecting Malware Using Deep Neural Networks
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…This article proposes a method for detecting malicious executable files by analyzing disassembled code. This method is based on a static analysis of assembler…”
Get full text
Journal Article -
17
Analysis of the Reliability of Template Storage When Implementing Modern Biometric Technologies in Information Security Systems
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…It can be argued that in certain areas of information technology, classical systems of authentication of the user of a computer system based on passwords and…”
Get full text
Journal Article -
18
Probability-Theoretical Models of Physical Random Number Generators
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…— This article presents the main probability-theoretic models that describe a wide class of physical random number generators and allow us to propose general…”
Get full text
Journal Article -
19
Protection Against Unauthorized Access of Mobile Devices When Using the BYOD Concept
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…The problems of using mobile devices in the work process of an organization when applying the BYOD concept are analyzed. An adapted methodology for assessing…”
Get full text
Journal Article -
20
Protection of Ad Hoc Networks against Distributed Network Scanning
ISSN: 0146-4116, 1558-108XPublished: Moscow Pleiades Publishing 01.12.2024Published in Automatic control and computer sciences (01.12.2024)“…The peculiarities of network scanning of self-organizing networks are studied, and the methods for its detection are analyzed. A modification of the hybrid…”
Get full text
Journal Article

