-
1
-
-
85065325911
-
Analytical models of network worm propagation
-
SPb.: Nauka, in Russian
-
Kotenko, I.V. and Vorontsov, V.V., (2007) Analytical Models of Network Worm Propagation, SPIIRAS Proceedings, SPb.: Nauka, (in Russian).
-
(2007)
SPIIRAS Proceedings
-
-
Kotenko, I.V.1
Vorontsov, V.V.2
-
2
-
-
85056374562
-
Stochastic modeling of cash flow for personal insurance fund using the cloud data storage
-
Bazilevych, K. et al., (2018) Stochastic modeling of cash flow for personal insurance fund using the cloud data storage, International Journal of Computing, 17(3), pp. 153-162.
-
(2018)
International Journal of Computing
, vol.17
, Issue.3
, pp. 153-162
-
-
Bazilevych, K.1
-
3
-
-
85058040754
-
Web-application development for tasks of prediction in medical domain
-
Lviv, Ukraine
-
Mazorchuck, M., Dobriak, V., and Chumachenko, D., (2018) Web-Application Development for Tasks of Prediction in Medical Domain, IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT), Lviv, Ukraine, pp. 5-8.
-
(2018)
IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT)
, pp. 5-8
-
-
Mazorchuck, M.1
Dobriak, V.2
Chumachenko, D.3
-
4
-
-
85058049116
-
Modeling of the processes of stakeholder involvement in command management in a multi-project environment
-
Dotsenko, N., Chumachenko, D., and Chumachenko, I., (2018) Modeling of the processes of stakeholder involvement in command management in a multi-project environment, IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018, Proceedings, pp. 29-32.
-
(2018)
IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies, CSIT 2018, Proceedings
, pp. 29-32
-
-
Dotsenko, N.1
Chumachenko, D.2
Chumachenko, I.3
-
5
-
-
84906854544
-
Group structures on quotient sets in classification problems
-
Mashtalir, V.P., Shlyakhov, V.V., and Yakovlev, S.V., (2014) Group structures on quotient sets in classification problems, Cybernetics and Systems Analysis, 50(4), pp. 507-518.
-
(2014)
Cybernetics and Systems Analysis
, vol.50
, Issue.4
, pp. 507-518
-
-
Mashtalir, V.P.1
Shlyakhov, V.V.2
Yakovlev, S.V.3
-
6
-
-
26944469458
-
Point-set methods of clusterization of standard information
-
Mashtalir, V.P. and Yakovlev, S.V., (2001) Point-set methods of clusterization of standard information, Cybernetics and Systems Analysis, 37(3), pp. 295-307.
-
(2001)
Cybernetics and Systems Analysis
, vol.37
, Issue.3
, pp. 295-307
-
-
Mashtalir, V.P.1
Yakovlev, S.V.2
-
7
-
-
0034486891
-
The mathematics of infectious diseases
-
Hethcote, H.W., (2000) The Mathematics of Infectious Diseases, SIAM Review, 42(4), pp. 599-653.
-
(2000)
SIAM Review
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.W.1
-
8
-
-
85141904034
-
Dynamics of network epidemics and effectiveness of protection system
-
Zaharchenko, A.A. and Hazhmuratov, M.A., (2008) Dynamics of network epidemics and effectiveness of protection system, Automated Management Systems and Automation Equipment, 144, pp. 189-193.
-
(2008)
Automated Management Systems and Automation Equipment
, vol.144
, pp. 189-193
-
-
Zaharchenko, A.A.1
Hazhmuratov, M.A.2
-
9
-
-
21244446222
-
Biologically inspired approaches to computer security
-
HP Labs Bristol, UK
-
Williamson, M.M., (2007) Biologically inspired approaches to computer security, HP Labs Technical Report HPL-2002-131, 10 p., HP Labs Bristol, UK., http://www.hpl.hp.com/techreports/2002/HPL2002-131.html.
-
(2007)
HP Labs Technical Report HPL-2002-131
, pp. 10
-
-
Williamson, M.M.1
-
10
-
-
0026156688
-
Directed-graph epidemiological models of computer viruses
-
Oakland, California
-
Kephart, J.O. and White, S.R., (1991) Directed-graph epidemiological models of computer viruses, Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 343-359, Oakland, California.
-
(1991)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 343-359
-
-
Kephart, J.O.1
White, S.R.2
-
12
-
-
85084162258
-
How to own the Internet in your spare time
-
San Francisco
-
Staniford, S., Paxson, V., and Weaver, N., (2002) How to own the Internet in your spare time, 11th Usenix Security Symposium, 19 p., San Francisco, http://www.icir.org/vern/papers/cdc-usenixsec02.
-
(2002)
11th Usenix Security Symposium
, pp. 19
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
14
-
-
2442553392
-
-
Cooperative Association for Internet Data Analysis CAIDA Web Site, University of California’s San Diego Supercomputer Center, 25 Aug
-
CAIDA Analysis of Code-Red, Cooperative Association for Internet Data Analysis CAIDA Web Site, University of California’s San Diego Supercomputer Center, 25 Aug 2001 http://www.caida.org/analysis/security/code-red.
-
(2001)
CAIDA Analysis of Code-Red
-
-
-
16
-
-
2642584593
-
-
CERT Advisory CA-2001-19 CERT Coordination Center Web Site, Carnegie Mellon Software Engineering Center, 19 Jul
-
CERT Advisory CA-2001-19, “Code Red” Worm Exploiting Buffer Overflow in IIS Indexing Service DLL, CERT Coordination Center Web Site, Carnegie Mellon Software Engineering Center, 19 Jul 2001 http://www.cert.org/advisories/CA-2001-19.html.
-
(2001)
Code Red” Worm Exploiting Buffer Overflow in IIS Indexing Service DLL
-
-
-
17
-
-
4244165283
-
-
CERT Advisory CA-2001-23, Worm, CERT Coordination Center Web Site, Carnegie Mellon Software Engineering Center, 26 Jul
-
CERT Advisory CA-2001-23, Continued Threat of the “Code Red” Worm, CERT Coordination Center Web Site, Carnegie Mellon Software Engineering Center, 26 Jul 2001 http://www.cert.org/advisories/CA-2001-23.html.
-
(2001)
Continued Threat of the “Code Red
-
-
-
18
-
-
85141903148
-
-
CNN Web Site, 1 Aug
-
“Code Red” Worm Spreads, Pentagon Reacts, CNN Web Site, 1 Aug 2001 http://www.cnn.com/2001/TECH/internet/08/01/code.red/index.html.
-
(2001)
Code Red” Worm Spreads, Pentagon Reacts
-
-
-
19
-
-
0141762461
-
Code-ReD: A case study on the spread and victims of an Internet worm
-
Moore, D., Shannon, C., and Brown, J., (2002) Code-Red: a case study on the spread and victims of an Internet worm, Internet Measurement Workshop (IMW), pp. 273-284.
-
(2002)
Internet Measurement Workshop (IMW)
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
20
-
-
22144491187
-
-
Elsevier Press, New York
-
Devaney, R.L., Hirsch, M.W., and Smale, S., (2004) Differential Equations, Dynamical Systems and an Introduction to Chaos, Elsevier Press, New York.
-
(2004)
Differential Equations, Dynamical Systems and An Introduction to Chaos
-
-
Devaney, R.L.1
Hirsch, M.W.2
Smale, S.3
-
22
-
-
84855519936
-
The N-intertwined SIS epidemic network model
-
Springer
-
Mieghem, P.V., (2011) The N-intertwined SIS epidemic network model, P. Computing, 93: 147, pp. 147-169, Springer.
-
(2011)
P. Computing
, vol.93
, Issue.147
, pp. 147-169
-
-
Mieghem, P.V.1
-
23
-
-
84885083917
-
A SIR e-epidemic model for computer worms based on cellular automata
-
Springer Berlin Heidelberg
-
Del Rey, A.M., (2013) A SIR e-Epidemic Model for Computer Worms Based on Cellular Automata, Advances in Artificial Intelligence, pp. 228-238, Springer Berlin Heidelberg.
-
(2013)
Advances in Artificial Intelligence
, pp. 228-238
-
-
Del Rey, A.M.1
-
24
-
-
83455249669
-
Stochastic modeling of worm propagation in trusted networks
-
Las Vegas, USA
-
Sehgal, V.K., (2006) Stochastic modeling of worm propagation in trusted networks, Security and Management Conference, pp. 482-488, Las Vegas, USA.
-
(2006)
Security and Management Conference
, pp. 482-488
-
-
Sehgal, V.K.1
-
25
-
-
70349898945
-
An SEIQR model for childhood diseases
-
Springer-Verlag
-
Gerberry, D.J. and Milner, F.A., (2009) An SEIQR model for childhood diseases, Journal of Mathematical Biology, 50(4), pp. 535-561, Springer-Verlag.
-
(2009)
Journal of Mathematical Biology
, vol.50
, Issue.4
, pp. 535-561
-
-
Gerberry, D.J.1
Milner, F.A.2
-
26
-
-
26844518826
-
Epidemiological models applied to viruses in computer networks
-
Piqueira, J.R.C., Navarro, B.F., and Monteiro, L.H., (2005) Epidemiological models applied to viruses in computer networks, Journal of Computer Science, 1(1), pp. 31-34.
-
(2005)
Journal of Computer Science
, vol.1
, Issue.1
, pp. 31-34
-
-
Piqueira, J.R.C.1
Navarro, B.F.2
Monteiro, L.H.3
-
28
-
-
85051117184
-
Forecasting of influenza epidemics in USSR
-
Russian
-
Baroyan, O.V. and Rvachev, L.A., (1978) Forecasting of influenza epidemics in USSR, Medicine, 2, pp.131-137, (in Russian).
-
(1978)
Medicine
, vol.2
, pp. 131-137
-
-
Baroyan, O.V.1
Rvachev, L.A.2
-
31
-
-
85047505454
-
On agent-based approach to influenza and acute respiratory virus infection simulation
-
Chumachenko, D., Dobriak, V., Mazorchuk, M., Meniailov, I., and Bazilevych, K., (2018) On agent-based approach to influenza and acute respiratory virus infection simulation, 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET), pp. 192-195.
-
(2018)
14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET)
, pp. 192-195
-
-
Chumachenko, D.1
Dobriak, V.2
Mazorchuk, M.3
Meniailov, I.4
Bazilevych, K.5
|