Results 101 to 110 of about 9,683 (183)
Some of the next articles are maybe not open access.
2022
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение и ÑкÑÑÑие нежелаÑелÑного конÑенÑа в ÑоÑиалÑнÑÑ ÑеÑÑÑ Â». Рданной ÑабоÑе пÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑлÑÐ¶Ð¸Ñ ÑилÑÑÑаÑÐ¸Ñ Ð½ÐµÐ¶ÐµÐ»Ð°ÑелÑного конÑенÑа.
openaire +1 more source
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение и ÑкÑÑÑие нежелаÑелÑного конÑенÑа в ÑоÑиалÑнÑÑ ÑеÑÑÑ Â». Рданной ÑабоÑе пÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑлÑÐ¶Ð¸Ñ ÑилÑÑÑаÑÐ¸Ñ Ð½ÐµÐ¶ÐµÐ»Ð°ÑелÑного конÑенÑа.
openaire +1 more source
2023
ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð¿Ñеделение наиболее ÑÑÑекÑивного меÑода маÑинного обÑÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑиÑинговÑÑ Ð²ÐµÐ±-ÑайÑов. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ ÑовÑеменнÑе меÑÐ¾Ð´Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑиÑи
openaire +1 more source
ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð¿Ñеделение наиболее ÑÑÑекÑивного меÑода маÑинного обÑÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑиÑинговÑÑ Ð²ÐµÐ±-ÑайÑов. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ ÑовÑеменнÑе меÑÐ¾Ð´Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑиÑи
openaire +1 more source
ÐбнаÑÑжение аÑак в MANET на оÑнове ÑепÑÑаÑионной модели
2020This work is devoted to the study of the applicability of the reputation model to the routing protocol for protection against network attacks in MANET. Tasks that were solved during the study: 1. Choosing the most suitable routing protocol to apply a reputation model to it. 2.
openaire +1 more source
2022
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение импеÑÑонаÑии пÑи ÑаÑпознавании Ð»Ð¸Ñ Ð² видеопоÑоке». ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение импеÑÑонаÑии пÑи ÑаÑпознавании Ð»Ð¸Ñ Ð² видеопоÑоке.
openaire +1 more source
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение импеÑÑонаÑии пÑи ÑаÑпознавании Ð»Ð¸Ñ Ð² видеопоÑоке». ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение импеÑÑонаÑии пÑи ÑаÑпознавании Ð»Ð¸Ñ Ð² видеопоÑоке.
openaire +1 more source
2017
РнаÑÑоÑÑей ÑабоÑе ÑаÑÑмаÑÑиваеÑÑÑ Ð¾Ð±Ð·Ð¾Ñ ÑÑнкÑиониÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¸ обнаÑÑÐ¶ÐµÐ½Ð¸Ñ linux kernel rootkit. РазÑабоÑан модÑÐ»Ñ Ð¾Ð±Ð½Ð°ÑÑживаÑÑий linux kernel rootkit. ÐодÑÐ»Ñ Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑаÑÑиÑен под более ÑиÑокий клаÑÑ kernel rootkit Ð ...
openaire +1 more source
РнаÑÑоÑÑей ÑабоÑе ÑаÑÑмаÑÑиваеÑÑÑ Ð¾Ð±Ð·Ð¾Ñ ÑÑнкÑиониÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¸ обнаÑÑÐ¶ÐµÐ½Ð¸Ñ linux kernel rootkit. РазÑабоÑан модÑÐ»Ñ Ð¾Ð±Ð½Ð°ÑÑживаÑÑий linux kernel rootkit. ÐодÑÐ»Ñ Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑаÑÑиÑен под более ÑиÑокий клаÑÑ kernel rootkit Ð ...
openaire +1 more source
2021
The given work is devoted to implementation of intrusion detection system based on bioinformatics method MetaFast. The goal of the work is intrusion detection with bioinformatics method MetaFast in the Internet. The research contains a study of methods for comparative metagenomics.
openaire +1 more source
The given work is devoted to implementation of intrusion detection system based on bioinformatics method MetaFast. The goal of the work is intrusion detection with bioinformatics method MetaFast in the Internet. The research contains a study of methods for comparative metagenomics.
openaire +1 more source
2023
In this paper, we study information about methods for classifying facial expressions and algorithms for detecting classifier anomalies. Then the selected models of convolutional neural networks are trained and the best one is selected. Next, the anomaly detection method is implemented and the results obtained are analyzed.
openaire +1 more source
In this paper, we study information about methods for classifying facial expressions and algorithms for detecting classifier anomalies. Then the selected models of convolutional neural networks are trained and the best one is selected. Next, the anomaly detection method is implemented and the results obtained are analyzed.
openaire +1 more source
2016
Ðанное поÑобие ÑодеÑÐ¶Ð¸Ñ Ð¾ÑновнÑе Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð¸ÑÑÐ¸Ð¿Ð»Ð¸Ð½Ñ Â«Ð¡Ð¿ÐµÑиалÑÐ½Ð°Ñ Ð¿Ð¾Ð´Ð³Ð¾Ñовка» по Ñеме «ÐбнаÑÑжение неиÑпÑавноÑÑей в ÑабоÑе ÑиÑÑÐµÐ¼Ñ Ñмазки двигаÑелÑ».ÐÑедназнаÑено Ð´Ð»Ñ Ð¿Ð¾Ð´Ð³Ð¾Ñовки пÑеподР...
openaire +1 more source
Ðанное поÑобие ÑодеÑÐ¶Ð¸Ñ Ð¾ÑновнÑе Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð¸ÑÑÐ¸Ð¿Ð»Ð¸Ð½Ñ Â«Ð¡Ð¿ÐµÑиалÑÐ½Ð°Ñ Ð¿Ð¾Ð´Ð³Ð¾Ñовка» по Ñеме «ÐбнаÑÑжение неиÑпÑавноÑÑей в ÑабоÑе ÑиÑÑÐµÐ¼Ñ Ñмазки двигаÑелÑ».ÐÑедназнаÑено Ð´Ð»Ñ Ð¿Ð¾Ð´Ð³Ð¾Ñовки пÑеподР...
openaire +1 more source
2018
Рданной ÑабоÑе пÑоведено иÑÑледование ÑазновидноÑÑей ÑекÑÑÑенÑнÑÑ Ð½ÐµÐ¹ÑоннÑÑ ÑеÑей, опиÑÐ°Ð½Ñ Ð¸Ñ Ð½ÐµÐ´Ð¾ÑÑаÑки и доÑÑоинÑÑва, а Ñакже облаÑÑи пÑименениÑ.
openaire +1 more source
Рданной ÑабоÑе пÑоведено иÑÑледование ÑазновидноÑÑей ÑекÑÑÑенÑнÑÑ Ð½ÐµÐ¹ÑоннÑÑ ÑеÑей, опиÑÐ°Ð½Ñ Ð¸Ñ Ð½ÐµÐ´Ð¾ÑÑаÑки и доÑÑоинÑÑва, а Ñакже облаÑÑи пÑименениÑ.
openaire +1 more source
2023
The purpose of the study is to evaluate the effectiveness of using reinforcement learning to test the possibility of bypassing XSS filtering of a web application firewall. The subject of the study is the effectiveness of using reinforcement learning to test the ability to bypass a firewall for web applications in the context of XSS attacks.
openaire +1 more source
The purpose of the study is to evaluate the effectiveness of using reinforcement learning to test the possibility of bypassing XSS filtering of a web application firewall. The subject of the study is the effectiveness of using reinforcement learning to test the ability to bypass a firewall for web applications in the context of XSS attacks.
openaire +1 more source