Results 111 to 120 of about 4,427 (143)
Some of the next articles are maybe not open access.
ÐбнаÑÑжение аÑак в MANET на оÑнове ÑепÑÑаÑионной модели
2020This work is devoted to the study of the applicability of the reputation model to the routing protocol for protection against network attacks in MANET. Tasks that were solved during the study: 1. Choosing the most suitable routing protocol to apply a reputation model to it. 2.
openaire +1 more source
2023
The object of research is neural network systems of computer vision. The purpose of the work is to develop a prototype of a neural network computer vision system with a mechanism to protect against backdoor attacks. Specialized software and mathematical software pycharm was used.
openaire +1 more source
The object of research is neural network systems of computer vision. The purpose of the work is to develop a prototype of a neural network computer vision system with a mechanism to protect against backdoor attacks. Specialized software and mathematical software pycharm was used.
openaire +1 more source
ÐвÑомаÑизаÑÐ¸Ñ Ð·Ð°ÑиÑÑ Android-пÑиложений Ð¾Ñ MITM-аÑак
2019Ð ÑабоÑе пÑедложен меÑод авÑомаÑиÑеÑкого внедÑÐµÐ½Ð¸Ñ ÑÑнкÑии пÑовеÑки ÑеÑÑиÑикаÑа в пÑиложение Ð´Ð»Ñ ÐС Android. Ðго оÑлиÑиÑелÑной оÑобенноÑÑÑÑ ÑвлÑеÑÑÑ Ð²Ð½ÐµÐ´Ñение данной пÑовеÑки в гоÑовÑе Android-пÑил
openaire +1 more source
2023
СпиÑок пеÑиодиÑеÑÐºÐ¸Ñ Ð¸Ð·Ð´Ð°Ð½Ð¸Ð¹ Ð´Ð»Ñ ÐµÐ´Ð¸Ð½Ð¾Ð³Ð¾ библиоÑеÑного Ñонда ÑодеÑÐ¶Ð¸Ñ Ð¿Ð¾Ð´Ð¿Ð¸ÑÐºÑ Ð½Ð° пеÑаÑнÑе Ð¸Ð·Ð´Ð°Ð½Ð¸Ñ Ð¸ ÑлекÑÑоннÑе веÑÑии.
openaire +1 more source
СпиÑок пеÑиодиÑеÑÐºÐ¸Ñ Ð¸Ð·Ð´Ð°Ð½Ð¸Ð¹ Ð´Ð»Ñ ÐµÐ´Ð¸Ð½Ð¾Ð³Ð¾ библиоÑеÑного Ñонда ÑодеÑÐ¶Ð¸Ñ Ð¿Ð¾Ð´Ð¿Ð¸ÑÐºÑ Ð½Ð° пеÑаÑнÑе Ð¸Ð·Ð´Ð°Ð½Ð¸Ñ Ð¸ ÑлекÑÑоннÑе веÑÑии.
openaire +1 more source
2023
    Тема вÑпÑÑкной ÑабоÑÑ: "ÐпÑимизаÑÐ¸Ñ Ð¿ÑоизводÑÑва лопаÑок Ð´Ð»Ñ ÑенÑÑобежнÑÑ ÐºÐ¾Ð¼Ð¿ÑеÑÑоÑов"ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа бÑла поÑвÑÑена опÑимизаÑии пÑоÑеÑÑа изгоÑÐ¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð»Ð¾Ð¿Ð°Ñок, а Ñакже ÑабоÑÐ¸Ñ ÐºÐ¾Ð»ÑÑ Ñ ...
openaire +1 more source
    Тема вÑпÑÑкной ÑабоÑÑ: "ÐпÑимизаÑÐ¸Ñ Ð¿ÑоизводÑÑва лопаÑок Ð´Ð»Ñ ÑенÑÑобежнÑÑ ÐºÐ¾Ð¼Ð¿ÑеÑÑоÑов"ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа бÑла поÑвÑÑена опÑимизаÑии пÑоÑеÑÑа изгоÑÐ¾Ð²Ð»ÐµÐ½Ð¸Ñ Ð»Ð¾Ð¿Ð°Ñок, а Ñакже ÑабоÑÐ¸Ñ ÐºÐ¾Ð»ÑÑ Ñ ...
openaire +1 more source
2020
ЦелÑÑ Ð´Ð°Ð½Ð½Ð¾Ð¹ ÑабоÑÑ ÑвлÑеÑÑÑ ÑвелиÑение ÑмкоÑÑи ÐÐµÑ ÐºÐ°Ð½Ð°Ð±Ð°Ð´Ñкого ÑÐµÐ»ÐµÐ²Ð¾Ð´Ð¾Ñ ÑанилиÑа Ð´Ð»Ñ Ð·Ð°ÑиÑÑ Ð¾Ñ ÑазмÑва паводковÑми водами обÑекÑов, ÑаÑположеннÑÑ Ð²Ð´Ð¾Ð»Ñ ÑÑÑла Ñеки ÐиÑик-УÑÑдаÑÑÑ Ð½Ð¸Ð¶Ðµ ÑеР...
openaire +1 more source
ЦелÑÑ Ð´Ð°Ð½Ð½Ð¾Ð¹ ÑабоÑÑ ÑвлÑеÑÑÑ ÑвелиÑение ÑмкоÑÑи ÐÐµÑ ÐºÐ°Ð½Ð°Ð±Ð°Ð´Ñкого ÑÐµÐ»ÐµÐ²Ð¾Ð´Ð¾Ñ ÑанилиÑа Ð´Ð»Ñ Ð·Ð°ÑиÑÑ Ð¾Ñ ÑазмÑва паводковÑми водами обÑекÑов, ÑаÑположеннÑÑ Ð²Ð´Ð¾Ð»Ñ ÑÑÑла Ñеки ÐиÑик-УÑÑдаÑÑÑ Ð½Ð¸Ð¶Ðµ ÑеР...
openaire +1 more source
2021
The given work is devoted to investigation of LSTM classifierâs robustness to adversarial attacks. The goal of the work is ensuring network security through enhancement of LSTM classifierâs robustness to adversarial attacks. In this diploma, adversarial attacks on machine learning models with their classification were studied.
openaire +1 more source
The given work is devoted to investigation of LSTM classifierâs robustness to adversarial attacks. The goal of the work is ensuring network security through enhancement of LSTM classifierâs robustness to adversarial attacks. In this diploma, adversarial attacks on machine learning models with their classification were studied.
openaire +1 more source
2022
ÐбÑекÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð²ÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ ÑвлÑеÑÑÑ Ð°Ð²ÑомаÑизиÑованное извлеÑение (паÑÑинг) даннÑÑ Ð¸Ð· банковÑÐºÐ¸Ñ Ð²ÑпиÑок в ÑоÑмаÑе PDF.
openaire +1 more source
ÐбÑекÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð²ÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ ÑвлÑеÑÑÑ Ð°Ð²ÑомаÑизиÑованное извлеÑение (паÑÑинг) даннÑÑ Ð¸Ð· банковÑÐºÐ¸Ñ Ð²ÑпиÑок в ÑоÑмаÑе PDF.
openaire +1 more source
2023
The purpose of the work is to study algorithms for detecting network attacks based on machine learning with a teacher. The subject of the study is the choice of algorithms for the exact determination of class a so. Tasks solved in the course of the study: 1. Analysis of data set parameters. 2. Selection of significant parameters of algorithms.
openaire +1 more source
The purpose of the work is to study algorithms for detecting network attacks based on machine learning with a teacher. The subject of the study is the choice of algorithms for the exact determination of class a so. Tasks solved in the course of the study: 1. Analysis of data set parameters. 2. Selection of significant parameters of algorithms.
openaire +1 more source
ÐбнаÑÑжение веб-аÑак в облаÑнÑÑ ÑеÑвиÑаÑ
The aim of the work is to improve the quality of web attack detection in cloud services. The subject of the study is the choice of an optimal machine learning algorithm for detecting web attacks with an attack detection accuracy higher than that of existing attack detection systems (SOA). Tasks to be solved during the research: 1.openaire +1 more source

