Results 81 to 90 of about 293 (123)
Some of the next articles are maybe not open access.
2023
In this paper, we study information about methods for classifying facial expressions and algorithms for detecting classifier anomalies. Then the selected models of convolutional neural networks are trained and the best one is selected. Next, the anomaly detection method is implemented and the results obtained are analyzed.
openaire +1 more source
In this paper, we study information about methods for classifying facial expressions and algorithms for detecting classifier anomalies. Then the selected models of convolutional neural networks are trained and the best one is selected. Next, the anomaly detection method is implemented and the results obtained are analyzed.
openaire +1 more source
2023
The purpose of the study is to evaluate the effectiveness of using reinforcement learning to test the possibility of bypassing XSS filtering of a web application firewall. The subject of the study is the effectiveness of using reinforcement learning to test the ability to bypass a firewall for web applications in the context of XSS attacks.
openaire +1 more source
The purpose of the study is to evaluate the effectiveness of using reinforcement learning to test the possibility of bypassing XSS filtering of a web application firewall. The subject of the study is the effectiveness of using reinforcement learning to test the ability to bypass a firewall for web applications in the context of XSS attacks.
openaire +1 more source
2017
РнаÑÑоÑÑей ÑабоÑе ÑаÑÑмаÑÑиваеÑÑÑ Ð¾Ð±Ð·Ð¾Ñ ÑÑнкÑиониÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¸ обнаÑÑÐ¶ÐµÐ½Ð¸Ñ linux kernel rootkit. РазÑабоÑан модÑÐ»Ñ Ð¾Ð±Ð½Ð°ÑÑживаÑÑий linux kernel rootkit. ÐодÑÐ»Ñ Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑаÑÑиÑен под более ÑиÑокий клаÑÑ kernel rootkit Ð ...
openaire +1 more source
РнаÑÑоÑÑей ÑабоÑе ÑаÑÑмаÑÑиваеÑÑÑ Ð¾Ð±Ð·Ð¾Ñ ÑÑнкÑиониÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¸ обнаÑÑÐ¶ÐµÐ½Ð¸Ñ linux kernel rootkit. РазÑабоÑан модÑÐ»Ñ Ð¾Ð±Ð½Ð°ÑÑживаÑÑий linux kernel rootkit. ÐодÑÐ»Ñ Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑаÑÑиÑен под более ÑиÑокий клаÑÑ kernel rootkit Ð ...
openaire +1 more source
2021
This work is devoted to the study of emergency situations in direct current supply systems (DCSS), such as secondary switching networks connected to discrete inputs of microprocessor terminals of relay protection and the development of methods and algorithms for their detection. Problems that were solved in the course of work: 1.
openaire +1 more source
This work is devoted to the study of emergency situations in direct current supply systems (DCSS), such as secondary switching networks connected to discrete inputs of microprocessor terminals of relay protection and the development of methods and algorithms for their detection. Problems that were solved in the course of work: 1.
openaire +1 more source
2021
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена пÑедоÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼ÐµÑода ÑÑÑановки локаÑоÑа на ÑÐ°Ð¼Ð¾Ð»ÐµÑ Ð´Ð»Ñ Ð¾Ð¿ÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¼ÐµÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð²ÑÑоковолÑÑнÑÑ Ð»Ð¸Ð½Ð¸Ð¹ Ð´Ð»Ñ Ð±ÑÑÑÑого и ÑоÑного опÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¼ÐµÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð²ÑÑоковоР...
openaire +1 more source
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена пÑедоÑÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼ÐµÑода ÑÑÑановки локаÑоÑа на ÑÐ°Ð¼Ð¾Ð»ÐµÑ Ð´Ð»Ñ Ð¾Ð¿ÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¼ÐµÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð²ÑÑоковолÑÑнÑÑ Ð»Ð¸Ð½Ð¸Ð¹ Ð´Ð»Ñ Ð±ÑÑÑÑого и ÑоÑного опÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¼ÐµÑÑÐ¾Ð¿Ð¾Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð²ÑÑоковоР...
openaire +1 more source
2022
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑеÑевÑÑ Ð²ÑоÑжений в WSN-ÑеÑÑÑ Ð¸ ÑазÑабоÑке меÑода Ð¸Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ Ð½Ð° оÑнове биоинÑпиÑиÑованного Ð¿Ð¾Ð´Ñ Ð¾Ð´Ð°.
openaire +1 more source
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑеÑевÑÑ Ð²ÑоÑжений в WSN-ÑеÑÑÑ Ð¸ ÑазÑабоÑке меÑода Ð¸Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ Ð½Ð° оÑнове биоинÑпиÑиÑованного Ð¿Ð¾Ð´Ñ Ð¾Ð´Ð°.
openaire +1 more source
2018
ÐаÑÑоÑÑÐ°Ñ ÑабоÑа ÑодеÑÐ¶Ð¸Ñ ÑезÑлÑÑаÑÑ ÑазÑабоÑки Ð¿Ð¾Ð´Ñ Ð¾Ð´Ð° к обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»Ð¸Ð¼Ð¾ÑÑнÑÑ ÐºÐ¾Ð¿Ð¸Ð¹ пÑогÑаммного обеÑпеÑениÑ. ÐбÑекÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑва иÑполнÑемÑÑ Ñайлов, как ÑозданнÑе ...
openaire +1 more source
ÐаÑÑоÑÑÐ°Ñ ÑабоÑа ÑодеÑÐ¶Ð¸Ñ ÑезÑлÑÑаÑÑ ÑазÑабоÑки Ð¿Ð¾Ð´Ñ Ð¾Ð´Ð° к обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»Ð¸Ð¼Ð¾ÑÑнÑÑ ÐºÐ¾Ð¿Ð¸Ð¹ пÑогÑаммного обеÑпеÑениÑ. ÐбÑекÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑва иÑполнÑемÑÑ Ñайлов, как ÑозданнÑе ...
openaire +1 more source
2022
The topic of the graduate qualification work is «Detecting attacks on smart buildings using machine learning methods».The purpose of the study is to solve the problem of intrusion detection in the BACnet network in the âsmart buildingâ environment using supervised machine learning methods.
openaire +1 more source
The topic of the graduate qualification work is «Detecting attacks on smart buildings using machine learning methods».The purpose of the study is to solve the problem of intrusion detection in the BACnet network in the âsmart buildingâ environment using supervised machine learning methods.
openaire +1 more source
2019
РнаÑÑоÑÑей вÑпÑÑкной квалиÑикаÑионной ÑабоÑе ÑпеÑиалиÑÑа пÑÐ¸Ð²ÐµÐ´ÐµÐ½Ñ ÑезÑлÑÑаÑÑ Ð¸ÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿ÑименимоÑÑи нейÑоÑеÑевой аÑÑ Ð¸ÑекÑÑÑÑ LSTM-GAN Ð´Ð»Ñ ÑеÑÐµÐ½Ð¸Ñ Ð·Ð°Ð´Ð°Ñи обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð°Ð½Ð¾Ð¼Ð°Ð»Ð¸Ð¹ ÑеÑевого ÑÑа
openaire +1 more source
РнаÑÑоÑÑей вÑпÑÑкной квалиÑикаÑионной ÑабоÑе ÑпеÑиалиÑÑа пÑÐ¸Ð²ÐµÐ´ÐµÐ½Ñ ÑезÑлÑÑаÑÑ Ð¸ÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿ÑименимоÑÑи нейÑоÑеÑевой аÑÑ Ð¸ÑекÑÑÑÑ LSTM-GAN Ð´Ð»Ñ ÑеÑÐµÐ½Ð¸Ñ Ð·Ð°Ð´Ð°Ñи обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð°Ð½Ð¾Ð¼Ð°Ð»Ð¸Ð¹ ÑеÑевого ÑÑа
openaire +1 more source
2022
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение вÑедоноÑнÑÑ PDF-Ñайлов Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð¼ÐµÑодов маÑинного обÑÑениÑ».ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¿Ð¾Ð²ÑÑение ÑÑÑекÑивноÑÑи обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð²ÑедоноÑнÑÑ PDF Ñ Ð ...
openaire +1 more source
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение вÑедоноÑнÑÑ PDF-Ñайлов Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð¼ÐµÑодов маÑинного обÑÑениÑ».ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¿Ð¾Ð²ÑÑение ÑÑÑекÑивноÑÑи обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð²ÑедоноÑнÑÑ PDF Ñ Ð ...
openaire +1 more source

