Results 71 to 80 of about 288 (121)
Some of the next articles are maybe not open access.
2022
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение и ÑкÑÑÑие нежелаÑелÑного конÑенÑа в ÑоÑиалÑнÑÑ ÑеÑÑÑ Â». Рданной ÑабоÑе пÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑлÑÐ¶Ð¸Ñ ÑилÑÑÑаÑÐ¸Ñ Ð½ÐµÐ¶ÐµÐ»Ð°ÑелÑного конÑенÑа.
openaire +1 more source
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение и ÑкÑÑÑие нежелаÑелÑного конÑенÑа в ÑоÑиалÑнÑÑ ÑеÑÑÑ Â». Рданной ÑабоÑе пÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑлÑÐ¶Ð¸Ñ ÑилÑÑÑаÑÐ¸Ñ Ð½ÐµÐ¶ÐµÐ»Ð°ÑелÑного конÑенÑа.
openaire +1 more source
2022
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение импеÑÑонаÑии пÑи ÑаÑпознавании Ð»Ð¸Ñ Ð² видеопоÑоке». ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение импеÑÑонаÑии пÑи ÑаÑпознавании Ð»Ð¸Ñ Ð² видеопоÑоке.
openaire +1 more source
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение импеÑÑонаÑии пÑи ÑаÑпознавании Ð»Ð¸Ñ Ð² видеопоÑоке». ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение импеÑÑонаÑии пÑи ÑаÑпознавании Ð»Ð¸Ñ Ð² видеопоÑоке.
openaire +1 more source
2021
During this work the neural network classifier of executable files in OS Win-dows with high classification accuracy has been developed. The first part, a neural network model for detecting virus software was studied, an attribute space for a neu-ral network classifier of executable files was also formed, and the structure of the PE format was ...
openaire +1 more source
During this work the neural network classifier of executable files in OS Win-dows with high classification accuracy has been developed. The first part, a neural network model for detecting virus software was studied, an attribute space for a neu-ral network classifier of executable files was also formed, and the structure of the PE format was ...
openaire +1 more source
2021
ÐÑедмеÑом вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение вÑедоноÑнÑÑ Android-пÑиложений. ЦелÑÑ Ð´Ð°Ð½Ð½Ð¾Ð¹ дипломной ÑабоÑÑ ÑвлÑеÑÑÑ Ð²ÑÑвление вÑедоноÑного пÑогÑаммного обеÑпеÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¾Ð ...
openaire +1 more source
ÐÑедмеÑом вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение вÑедоноÑнÑÑ Android-пÑиложений. ЦелÑÑ Ð´Ð°Ð½Ð½Ð¾Ð¹ дипломной ÑабоÑÑ ÑвлÑеÑÑÑ Ð²ÑÑвление вÑедоноÑного пÑогÑаммного обеÑпеÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¾Ð ...
openaire +1 more source
2023
ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð¿Ñеделение наиболее ÑÑÑекÑивного меÑода маÑинного обÑÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑиÑинговÑÑ Ð²ÐµÐ±-ÑайÑов. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ ÑовÑеменнÑе меÑÐ¾Ð´Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑиÑи
openaire +1 more source
ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð¿Ñеделение наиболее ÑÑÑекÑивного меÑода маÑинного обÑÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑиÑинговÑÑ Ð²ÐµÐ±-ÑайÑов. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ ÑовÑеменнÑе меÑÐ¾Ð´Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑиÑи
openaire +1 more source
2023
In this paper, we study information about methods for classifying facial expressions and algorithms for detecting classifier anomalies. Then the selected models of convolutional neural networks are trained and the best one is selected. Next, the anomaly detection method is implemented and the results obtained are analyzed.
openaire +1 more source
In this paper, we study information about methods for classifying facial expressions and algorithms for detecting classifier anomalies. Then the selected models of convolutional neural networks are trained and the best one is selected. Next, the anomaly detection method is implemented and the results obtained are analyzed.
openaire +1 more source
2023
The purpose of the study is to evaluate the effectiveness of using reinforcement learning to test the possibility of bypassing XSS filtering of a web application firewall. The subject of the study is the effectiveness of using reinforcement learning to test the ability to bypass a firewall for web applications in the context of XSS attacks.
openaire +1 more source
The purpose of the study is to evaluate the effectiveness of using reinforcement learning to test the possibility of bypassing XSS filtering of a web application firewall. The subject of the study is the effectiveness of using reinforcement learning to test the ability to bypass a firewall for web applications in the context of XSS attacks.
openaire +1 more source
2017
РнаÑÑоÑÑей ÑабоÑе ÑаÑÑмаÑÑиваеÑÑÑ Ð¾Ð±Ð·Ð¾Ñ ÑÑнкÑиониÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¸ обнаÑÑÐ¶ÐµÐ½Ð¸Ñ linux kernel rootkit. РазÑабоÑан модÑÐ»Ñ Ð¾Ð±Ð½Ð°ÑÑживаÑÑий linux kernel rootkit. ÐодÑÐ»Ñ Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑаÑÑиÑен под более ÑиÑокий клаÑÑ kernel rootkit Ð ...
openaire +1 more source
РнаÑÑоÑÑей ÑабоÑе ÑаÑÑмаÑÑиваеÑÑÑ Ð¾Ð±Ð·Ð¾Ñ ÑÑнкÑиониÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¸ обнаÑÑÐ¶ÐµÐ½Ð¸Ñ linux kernel rootkit. РазÑабоÑан модÑÐ»Ñ Ð¾Ð±Ð½Ð°ÑÑживаÑÑий linux kernel rootkit. ÐодÑÐ»Ñ Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑаÑÑиÑен под более ÑиÑокий клаÑÑ kernel rootkit Ð ...
openaire +1 more source
2021
This work is devoted to the study of emergency situations in direct current supply systems (DCSS), such as secondary switching networks connected to discrete inputs of microprocessor terminals of relay protection and the development of methods and algorithms for their detection. Problems that were solved in the course of work: 1.
openaire +1 more source
This work is devoted to the study of emergency situations in direct current supply systems (DCSS), such as secondary switching networks connected to discrete inputs of microprocessor terminals of relay protection and the development of methods and algorithms for their detection. Problems that were solved in the course of work: 1.
openaire +1 more source
2021
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена пÑедоÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼ÐµÑода ÑÑÑановки локаÑоÑа на ÑÐ°Ð¼Ð¾Ð»ÐµÑ Ð´Ð»Ñ Ð¾Ð¿ÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¼ÐµÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð²ÑÑоковолÑÑнÑÑ Ð»Ð¸Ð½Ð¸Ð¹ Ð´Ð»Ñ Ð±ÑÑÑÑого и ÑоÑного опÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¼ÐµÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð²ÑÑоковоР...
openaire +1 more source
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена пÑедоÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼ÐµÑода ÑÑÑановки локаÑоÑа на ÑÐ°Ð¼Ð¾Ð»ÐµÑ Ð´Ð»Ñ Ð¾Ð¿ÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¼ÐµÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð²ÑÑоковолÑÑнÑÑ Ð»Ð¸Ð½Ð¸Ð¹ Ð´Ð»Ñ Ð±ÑÑÑÑого и ÑоÑного опÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¼ÐµÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð²ÑÑоковоР...
openaire +1 more source

