Results 101 to 110 of about 63,311 (145)
Some of the next articles are maybe not open access.
2021
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа напÑавлена на ÑазÑабоÑÐºÑ ÑиÑÑÐµÐ¼Ñ Ð´Ð»Ñ ÑаÑÐ¿Ð¾Ð·Ð½Ð°Ð²Ð°Ð½Ð¸Ñ Ð¡OVID-19 и дÑÑÐ³Ð¸Ñ Ð·Ð°Ð±Ð¾Ð»ÐµÐ²Ð°Ð½Ð¸Ð¹ Ð»ÐµÐ³ÐºÐ¸Ñ Ð¿Ð¾ ÑенÑгеновÑким Ñнимкам. ÐадаÑи, коÑоÑÑе ÑеÑалиÑÑ Ð² Ñ Ð¾Ð´Ðµ вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ ÑабоÑÑ: 1.
openaire +1 more source
ÐÐ°Ð½Ð½Ð°Ñ ÑабоÑа напÑавлена на ÑазÑабоÑÐºÑ ÑиÑÑÐµÐ¼Ñ Ð´Ð»Ñ ÑаÑÐ¿Ð¾Ð·Ð½Ð°Ð²Ð°Ð½Ð¸Ñ Ð¡OVID-19 и дÑÑÐ³Ð¸Ñ Ð·Ð°Ð±Ð¾Ð»ÐµÐ²Ð°Ð½Ð¸Ð¹ Ð»ÐµÐ³ÐºÐ¸Ñ Ð¿Ð¾ ÑенÑгеновÑким Ñнимкам. ÐадаÑи, коÑоÑÑе ÑеÑалиÑÑ Ð² Ñ Ð¾Ð´Ðµ вÑÐ¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ ÑабоÑÑ: 1.
openaire +1 more source
2021
The given work is devoted to implementation of intrusion detection system based on bioinformatics method MetaFast. The goal of the work is intrusion detection with bioinformatics method MetaFast in the Internet. The research contains a study of methods for comparative metagenomics.
openaire +1 more source
The given work is devoted to implementation of intrusion detection system based on bioinformatics method MetaFast. The goal of the work is intrusion detection with bioinformatics method MetaFast in the Internet. The research contains a study of methods for comparative metagenomics.
openaire +1 more source
ÐбнаÑÑжение аÑак в MANET на оÑнове ÑепÑÑаÑионной модели
2020This work is devoted to the study of the applicability of the reputation model to the routing protocol for protection against network attacks in MANET. Tasks that were solved during the study: 1. Choosing the most suitable routing protocol to apply a reputation model to it. 2.
openaire +1 more source
2022
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение и ÑкÑÑÑие нежелаÑелÑного конÑенÑа в ÑоÑиалÑнÑÑ ÑеÑÑÑ Â». Рданной ÑабоÑе пÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑлÑÐ¶Ð¸Ñ ÑилÑÑÑаÑÐ¸Ñ Ð½ÐµÐ¶ÐµÐ»Ð°ÑелÑного конÑенÑа.
openaire +1 more source
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение и ÑкÑÑÑие нежелаÑелÑного конÑенÑа в ÑоÑиалÑнÑÑ ÑеÑÑÑ Â». Рданной ÑабоÑе пÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑлÑÐ¶Ð¸Ñ ÑилÑÑÑаÑÐ¸Ñ Ð½ÐµÐ¶ÐµÐ»Ð°ÑелÑного конÑенÑа.
openaire +1 more source
2022
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение импеÑÑонаÑии пÑи ÑаÑпознавании Ð»Ð¸Ñ Ð² видеопоÑоке». ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение импеÑÑонаÑии пÑи ÑаÑпознавании Ð»Ð¸Ñ Ð² видеопоÑоке.
openaire +1 more source
Тема вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ: «ÐбнаÑÑжение импеÑÑонаÑии пÑи ÑаÑпознавании Ð»Ð¸Ñ Ð² видеопоÑоке». ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение импеÑÑонаÑии пÑи ÑаÑпознавании Ð»Ð¸Ñ Ð² видеопоÑоке.
openaire +1 more source
2021
During this work the neural network classifier of executable files in OS Win-dows with high classification accuracy has been developed. The first part, a neural network model for detecting virus software was studied, an attribute space for a neu-ral network classifier of executable files was also formed, and the structure of the PE format was ...
openaire +1 more source
During this work the neural network classifier of executable files in OS Win-dows with high classification accuracy has been developed. The first part, a neural network model for detecting virus software was studied, an attribute space for a neu-ral network classifier of executable files was also formed, and the structure of the PE format was ...
openaire +1 more source
2021
ÐÑедмеÑом вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение вÑедоноÑнÑÑ Android-пÑиложений. ЦелÑÑ Ð´Ð°Ð½Ð½Ð¾Ð¹ дипломной ÑабоÑÑ ÑвлÑеÑÑÑ Ð²ÑÑвление вÑедоноÑного пÑогÑаммного обеÑпеÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¾Ð ...
openaire +1 more source
ÐÑедмеÑом вÑпÑÑкной квалиÑикаÑионной ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение вÑедоноÑнÑÑ Android-пÑиложений. ЦелÑÑ Ð´Ð°Ð½Ð½Ð¾Ð¹ дипломной ÑабоÑÑ ÑвлÑеÑÑÑ Ð²ÑÑвление вÑедоноÑного пÑогÑаммного обеÑпеÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¾Ð ...
openaire +1 more source
2023
ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð¿Ñеделение наиболее ÑÑÑекÑивного меÑода маÑинного обÑÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑиÑинговÑÑ Ð²ÐµÐ±-ÑайÑов. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ ÑовÑеменнÑе меÑÐ¾Ð´Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑиÑи
openaire +1 more source
ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð¿Ñеделение наиболее ÑÑÑекÑивного меÑода маÑинного обÑÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑиÑинговÑÑ Ð²ÐµÐ±-ÑайÑов. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ ÑовÑеменнÑе меÑÐ¾Ð´Ñ Ð¾Ð±Ð½Ð°ÑÑÐ¶ÐµÐ½Ð¸Ñ ÑиÑи
openaire +1 more source
2023
In this paper, we study information about methods for classifying facial expressions and algorithms for detecting classifier anomalies. Then the selected models of convolutional neural networks are trained and the best one is selected. Next, the anomaly detection method is implemented and the results obtained are analyzed.
openaire +1 more source
In this paper, we study information about methods for classifying facial expressions and algorithms for detecting classifier anomalies. Then the selected models of convolutional neural networks are trained and the best one is selected. Next, the anomaly detection method is implemented and the results obtained are analyzed.
openaire +1 more source
2023
The purpose of the study is to evaluate the effectiveness of using reinforcement learning to test the possibility of bypassing XSS filtering of a web application firewall. The subject of the study is the effectiveness of using reinforcement learning to test the ability to bypass a firewall for web applications in the context of XSS attacks.
openaire +1 more source
The purpose of the study is to evaluate the effectiveness of using reinforcement learning to test the possibility of bypassing XSS filtering of a web application firewall. The subject of the study is the effectiveness of using reinforcement learning to test the ability to bypass a firewall for web applications in the context of XSS attacks.
openaire +1 more source

