Neural network model for detecting network scanning attacks methods and approaches to scanning
network ports are considered. Intrusion detection systems (IDS
Обнаружение DGA доменов и предотвращение botnet средствами Q-обучения для POMDP в процессе взаимодействия с окружением. An effective
method for preventing the
operation of computer
Analysis of the Using of D2D Communications for the Ad Hoc Network Based on Subscriber Terminals, the probability of connectivity depends on time. Such a
network can
operate as a
network with acceptable delays
Small object detection method development of deep convolutional neural
networks (CNN)/ When it comes to small objects? the accuracy of deep
Application of fuzzy synchronization in the NLOS UV communication systemTo ensure the effective
operation of UV-C communication systems in the non-line-of-sight (NLOS
Face tracking with automatic age and gender detection. It describes the main algorithms and
methods used in this field, including machine learning and computer vision
Analytical model for Software Defined Network delay estimationTraditional IP
networks are becoming more complex to satisfy the demands of modern applications
Neural network method of dynamic biometrics for detecting the substitution of computer research the dynamic neural
network method for biometric identification of computer users. We analyze
Emergence of the small-world architecture in neural networks by activity dependent growth of the
network's connections structure, we used the random graphs theory
methods. It is shown that the growth