| |
Pechenyy E.A., Nuriev N.K., Starygina S.D. SELF-ORGANIZING CLUSTERING OF GREAT DATA FLOW | 10-20 |
|
Chastikova V.A., Zherlitsyn S.A., Volya Y.I., Sotnikov V.V. NEURAL NETWORK TECHNOLOGY FOR DETECTING ANOMALOUS NETWORK TRAFFIC | 20-32 |
|
Milovidova A.A. CREATION OF THE FUZZY MEASUREMENT SYSTEM FOR DECISION SUPPORT SYSTEM WHEN MANAGING THE PRODUCTION PROCESS IN AN UNCERTAIN INFORMATION ABOUT THE QUALITY OF THE MATERIAL BEING PROCESSED | 33-48 |
|
Sai V.C., Shcherbakov M.V. FAILURE PREDICTION OF COMPLEX MULTIPLE-COMPONENT SYSTEMS BASED ON A COMBINATION OF NEURAL NETWORKS: WAYS TO IMPROVE THE ACCURACY OF FORECASTING | 49-60 |
|
Bondarev A.A., Vasilyev N.V., Konovalova D.I., Brumshteyn Y.M. DEVELOPMENT, COMMISSIONING AND USE OF “BUSINESS CARD SITES”: ANALYSIS OF TARGETS, POSSIBLE APPROACHES, LABOR CONSUMPTION, RISK STRUCTURE | 61-76 |
|
Iglina N.A., Brumshteyn Y.M., Vrublevskaya K.A., Konovalova D.I. NON-LIABILITY OF ORGANIZATION PERSONNEL IN THE CONDITIONS OF INFORMATION-TELECOMMUNICATION TECHNOLOGIES DEVELOPMENT: ANALYSIS OF POSSIBLE INFORMATION SOURCES, IDENTIFICATION APPROACHES, MODELS AND MANAGEMENT METHODS | 77-93 |
|
Gordeev I.I., Ovcharenro S.S., Sizova A.A. THE DETERMINATION OF THE CONDUCTING BACKBONE IN A TWO-DIMENSIONAL LATTICE BY THE FLOODING METHOD | 94-111 |
|
Rotkin V.M., Sokolovsky Y.B., Azhmukhamedov I.M. DARIER ROTOR AND OPTIMIZED WIND TURBINES: COMPARATIVE ANALYSIS | 111-121 |
|
Kryukova E.S., Parashchuk I.B. MATHEMATICAL MODEL FOR ESTIMATING THE QUALITY OF ELECTRONIC LIBRARY: SYNTHESIS OF THE NUMBER OF GRADATIONS OF SPACE STATES | 121-131 |
|
Solovjev D.S., Solovjeva I.A., Litovka Y.V. INVERSE PROBLEM SOLUTION OF THE MATHEMATICAL MODELING FOR GALVANIC PROCESS TO OPTIMIZE THE NON-UNIFORMITY OF THE COATING THICKNESS | 131-143 |
|
Vlasenko A.V., Dzoban P.I., Zhuk R.V. ANALYTICAL REVIEW OF MACHINE LEARNING TOOLS AND THEIR APPLICATIONS IN THE FIELD OF CYBER SECURITY | 144-155 |
|
Novoseltseva A.V., Klyuev S.G. MODERN METHODS OF ATTACS OF DEANIMONIZATION ON THE TOR NETWORK | 155-161 |
|
Zhuk R.V., Dzoban P.I., Vlasenko A.V. BUILDING A RELATIONSHIP BETWEEN AN INFORMATION SECURITY INTRUDER AND VULNERABILITIES OF INFORMATION ASSETS IN INFORMATION SYSTEMS FOR PROCESSING PERSONAL DATA | 162-169 |
|
Zhuk R.V., Dzoban P.I., Vlasenko A.V. DETERMINING THE RELEVANCE OF INFORMATION SECURITY THREATS IN INFORMATION SYSTEMS FOR PROCESSING PERSONAL DATA USING THE MATHEMATICAL APPARATUS OF NEURAL NETWORKS | 169-178 |
|