Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 26 results
Sort by: relevance publication year

Exploring the possibilities of Honeypot technology

JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity

1

JOURNAL ISSUE published 2020 in Computer Science and Cybersecurity

JOURNAL ISSUE published 2019 in Computer Science and Cybersecurity

Parallelization of the mathematical model of gabor filter

JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity

Investigation of the cross-platform Flutter framework. Will the heyday of this technology mean the disappearance of the native development on Android and iOS?

JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity

Application of cryptographic algorithms in decentralized networks and prospects for their replacement for the post-quantum period

JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity

Fingerprint verification using the traveling salesman problem solution and decomposition of the vicinity of the minutiae

JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity

JOURNAL ISSUE published 2019 in Computer Science and Cybersecurity

2

JOURNAL ISSUE published 2020 in Computer Science and Cybersecurity

Definitive problems of the Terms of the Sphere of Cyber security and Cyber Defense and the Ways of their solution

JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity

Research of the cyberbullying phenomenon and analysis of ways to counter its manifestations

JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity

Mathematical model of the biometric system of fingerprint authentication

JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity

Mathematical model of the process of tabular’s implementation of the operation algebraic multiplication in the residues class

JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity

Review of consensus protocols used in Blockchain technologies

JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity

Overview of static methods of analysis malicious software

JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity

Requirements for creating tools to emulate software integration processes using HTTP/HTTPS protocols

JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity

Finding the optimal VPN-solution based on the hierarchies analysis method

JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity

Method of cryptologic data transformations

JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity

Building a voting system with using blockchain technologies in the example of Hyperledger

JOURNAL ARTICLE published 2019 in Computer Science and Cybersecurity

Advanced code-based electronic digital signature scheme

JOURNAL ARTICLE published 2020 in Computer Science and Cybersecurity