Facet browsing currently unavailable
Page 1 of 26 results
Sort by: relevance publication year
Exploring the possibilities of Honeypot technology JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity |
1 JOURNAL ISSUE published 2020 in Computer Science and Cybersecurity |
JOURNAL ISSUE published 2019 in Computer Science and Cybersecurity |
Parallelization of the mathematical model of gabor filter JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity |
Investigation of the cross-platform Flutter framework. Will the heyday of this technology mean the disappearance of the native development on Android and iOS? JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity |
Application of cryptographic algorithms in decentralized networks and prospects for their replacement for the post-quantum period JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity |
Fingerprint verification using the traveling salesman problem solution and decomposition of the vicinity of the minutiae JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity |
JOURNAL ISSUE published 2019 in Computer Science and Cybersecurity |
2 JOURNAL ISSUE published 2020 in Computer Science and Cybersecurity |
Definitive problems of the Terms of the Sphere of Cyber security and Cyber Defense and the Ways of their solution JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity |
Research of the cyberbullying phenomenon and analysis of ways to counter its manifestations JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity |
Mathematical model of the biometric system of fingerprint authentication JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity |
Mathematical model of the process of tabular’s implementation of the operation algebraic multiplication in the residues class JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity |
Review of consensus protocols used in Blockchain technologies JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity |
Overview of static methods of analysis malicious software JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity |
Requirements for creating tools to emulate software integration processes using HTTP/HTTPS protocols JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity |
Finding the optimal VPN-solution based on the hierarchies analysis method JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity |
Method of cryptologic data transformations JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity |
Building a voting system with using blockchain technologies in the example of Hyperledger JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity |
Advanced code-based electronic digital signature scheme JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity |