Results 141 to 145 of about 63,311 (145)
Some of the next articles are maybe not open access.
2019
ÐбнаÑÑжение аномалÑной акÑивноÑÑи ÑвлÑеÑÑÑ Ñложной пÑоблемой в видеонаблÑдении в ÑелÑÑ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи и заÑиÑÑ ÑиÑÑемÑ. ÐÑ Ð¿ÑедÑÑавлÑем новÑй Ð¿Ð¾Ð´Ñ Ð¾Ð´ к обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð°Ð½Ð¾Ð¼Ð°Ð»Ñной акÑивноÑÑи пÑи вР...
openaire +1 more source
ÐбнаÑÑжение аномалÑной акÑивноÑÑи ÑвлÑеÑÑÑ Ñложной пÑоблемой в видеонаблÑдении в ÑелÑÑ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи и заÑиÑÑ ÑиÑÑемÑ. ÐÑ Ð¿ÑедÑÑавлÑем новÑй Ð¿Ð¾Ð´Ñ Ð¾Ð´ к обнаÑÑÐ¶ÐµÐ½Ð¸Ñ Ð°Ð½Ð¾Ð¼Ð°Ð»Ñной акÑивноÑÑи пÑи вР...
openaire +1 more source
ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение оÑибок конÑигÑÑаÑии межÑеÑевÑÑ
ÑкÑанов меÑодом пÑовеÑки модели. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑеÑÑÑ ÐºÐ¾ÑÑекÑноÑÑÑ ÐºÐ¾Ð½ÑигÑÑаÑии межÑеÑевого ÑкÑана и ее ÑооÑвеÑÑ
openaire +1 more source
openaire +1 more source
The purpose of the study is to identify attempts to implement phishing attacks based on the analysis of text messages distributed over the network via e-mail. The research set the following goals: 1. Systematize phishing attacks based on their implementation features. 2.
openaire +1 more source
openaire +1 more source
Theme of the final qualification work: «Detection of unauthorised con-trol channels of computer network nodes». The purpose of the work is detection of unauthorised control channels of com-puter network nodes. The subject of the study is the detection of unauthorised control channels of computer network nodes.
openaire +1 more source
openaire +1 more source
ЦелÑÑ ÑабоÑÑ ÑвлÑеÑÑÑ Ð¾Ð±Ð½Ð°ÑÑжение вÑедоноÑной акÑивноÑÑи в конвейеÑаÑ
CI/CD на оÑнове даннÑÑ
, полÑÑаемÑÑ
Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑеÑ
нологии eBPF. ÐÑедмеÑом иÑÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ ÑвлÑÑÑÑÑ ÑовÑеменнÑе подÑ
Ð¾Ð´Ñ Ðº вÑÑвленР...
openaire +1 more source
openaire +1 more source

