All articles by "Tsirlov V.L."
Model for Presenting the Input Set of Signatures in the Form of a Reduced Decision Diagram
Authors: Dobkach L.Ya., Tsirlov V.L. | Published: 02.04.2024 |
Published in issue: #1(146)/2024 | |
DOI: | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: signature analysis, machine learning, CICIDS 2017, intrusion detection, decision trees |
Heuristic analysis of source code security
Authors: Markov A.S. , Matveev V.A. , Fadin A.A., Tsirlov V.L. | Published: 19.02.2016 |
Published in issue: #1(106)/2016 | |
DOI: 10.18698/0236-3933-2016-1-98-111 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information security, software security, testing, static analysis, production models, heuristic analysis, vulnerabilities, defects, undeclared capabilities |
Standards and Policy of Information Security of Automated Systems
Authors: Medvedev N.V., Kvasov P.M., Tsirlov V.L. | Published: 28.10.2013 |
Published in issue: #1(78)/2010 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: policy ofinformation security, automated system, safety threats, information security model, information risks, risk model |