Results 91 to 97 of about 161 (97)
Some of the next articles are maybe not open access.
2018
РдиÑÑеÑÑаÑионной ÑабоÑе пÑоанализиÑÐ¾Ð²Ð°Ð½Ñ ÑÑÐ»Ð¾Ð²Ð¸Ñ Ð¸ возможноÑÑи пÑÐ¸Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² аÑдиÑе ÑÑаÑиÑÑиÑеÑÐºÐ¸Ñ Ð²ÑбоÑоÑнÑÑ Ð¿ÑоÑедÑÑ, ÑиÑÑемаÑизиÑÐ¾Ð²Ð°Ð½Ñ ÑеоÑеÑиÑеÑкие ÑаÑпÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ ÑлÑÑайнÑÑ Ð²ÐµÐ»Ð¸Ñин и Ñ ...
openaire +1 more source
РдиÑÑеÑÑаÑионной ÑабоÑе пÑоанализиÑÐ¾Ð²Ð°Ð½Ñ ÑÑÐ»Ð¾Ð²Ð¸Ñ Ð¸ возможноÑÑи пÑÐ¸Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² аÑдиÑе ÑÑаÑиÑÑиÑеÑÐºÐ¸Ñ Ð²ÑбоÑоÑнÑÑ Ð¿ÑоÑедÑÑ, ÑиÑÑемаÑизиÑÐ¾Ð²Ð°Ð½Ñ ÑеоÑеÑиÑеÑкие ÑаÑпÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ ÑлÑÑайнÑÑ Ð²ÐµÐ»Ð¸Ñин и Ñ ...
openaire +1 more source
The purpose of the study is to protect binary executable files in Windows OS based on the self-modified code. The subject of the research is modern methods of protecting against exploitation of binary files and executable files in Windows OS. Problems solved during the study: 1.
openaire +1 more source
openaire +1 more source
2019
Ð Ñ Ð¾Ð´Ðµ ÑабоÑÑ Ð±Ñло пÑоведено иÑÑледование и адапÑаÑÐ¸Ñ Ð°Ð»Ð³Ð¾ÑиÑма еÑÑеÑÑвенного гÑадиенÑного ÑпÑÑка к задаÑе Q-обÑÑениÑ. ÐÑла вÑбÑана и Ñеализована аÑÑ Ð¸ÑекÑÑÑа агенÑа Q-обÑÑениÑ, ÑÐ¾Ð·Ð´Ð°Ð½Ñ Ð¸ пÑÐ¾Ñ ...
openaire +1 more source
Ð Ñ Ð¾Ð´Ðµ ÑабоÑÑ Ð±Ñло пÑоведено иÑÑледование и адапÑаÑÐ¸Ñ Ð°Ð»Ð³Ð¾ÑиÑма еÑÑеÑÑвенного гÑадиенÑного ÑпÑÑка к задаÑе Q-обÑÑениÑ. ÐÑла вÑбÑана и Ñеализована аÑÑ Ð¸ÑекÑÑÑа агенÑа Q-обÑÑениÑ, ÑÐ¾Ð·Ð´Ð°Ð½Ñ Ð¸ пÑÐ¾Ñ ...
openaire +1 more source
2019
In the given work an approach to protecting applications from exploitation of vulnerabilities outlined. Considered various vulnerabilities and principals of their operation. Existing solution were analyzed. Method of protection was developed. A specific software implementation of this method done.
openaire +1 more source
In the given work an approach to protecting applications from exploitation of vulnerabilities outlined. Considered various vulnerabilities and principals of their operation. Existing solution were analyzed. Method of protection was developed. A specific software implementation of this method done.
openaire +1 more source
2016
This diploma thesis is devoted to the analysis of security of IBM-PC compatible computer systems based on x86 and x86-64 architectures. During this thesis, all features of hardware attacks, their main goals, the effects, the conditions for their successful outcome and methods of protection against these attacks were researched.
openaire +1 more source
This diploma thesis is devoted to the analysis of security of IBM-PC compatible computer systems based on x86 and x86-64 architectures. During this thesis, all features of hardware attacks, their main goals, the effects, the conditions for their successful outcome and methods of protection against these attacks were researched.
openaire +1 more source
Рданной ÑабоÑе вÑбÑано обоÑÑдование Ñложной ÑлекÑÑоÑнеÑгеÑиÑеÑкой ÑиÑÑÐµÐ¼Ñ 750/330 кÐ, ÑаÑÑÑиÑан ÑÑÑановивÑейÑÑ Ñежим ее ÑабоÑÑ Ñ Ð¸ÑполÑзованием аналиÑиÑеÑкого ÑаÑÑеÑа и пÑогÑÐ°Ð¼Ð¼Ñ RastWin, ÑаÑÑÑÐ¸Ñ ...
openaire +1 more source
openaire +1 more source
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа поÑвÑÑена иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¼ÐµÑодов диагноÑÑики и конÑÑÐ¾Ð»Ñ ÑÑанÑÑоÑмаÑоÑов. ÐÑоизведен анализ повÑеждений в оÑновнÑÑ
ÑиÑÑемаÑ
ÑÑанÑÑоÑмаÑоÑа и комплекÑÑÑÑиÑ
его ÑзлаÑ
, и пÑиÑин, по ...
openaire +1 more source
openaire +1 more source

