Synthesis of algorithms for recognition of vulnerabilities in web-resources through signatures of fuzzy linguistic features
Saved in:
| Date: | 2017 |
|---|---|
| Main Author: | O. A. Iliashov |
| Format: | Article |
| Language: | English |
| Published: |
2017
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000700161 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Improvement of the signature-system method by applying priority features in the signatures of monitoring objects to ensure maximum probability of their proper recognition
by: O. A. Iliashov, et al.
Published: (2020)
by: O. A. Iliashov, et al.
Published: (2020)
Additional radar signature for waterborne object recognition
by: V. M. Horobets, et al.
Published: (2021)
by: V. M. Horobets, et al.
Published: (2021)
Automatic detection algorithm for vulnerability of SQL-injection
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Fuzzy underwater image recognition
by: V. H. Pysarenko, et al.
Published: (2018)
by: V. H. Pysarenko, et al.
Published: (2018)
An approach to constructing a mathematical model of the signature to determine the monitoring objects using the informativity of its monitoring features
by: O. A. Iliashov, et al.
Published: (2020)
by: O. A. Iliashov, et al.
Published: (2020)
Building a digital signature algorithm with use of functions of generalized quaternions
by: Kalinovsky, Ya. O., et al.
Published: (2015)
by: Kalinovsky, Ya. O., et al.
Published: (2015)
Basis Partitions and Their Signature
by: Alladi, Krishnaswami
Published: (2025)
by: Alladi, Krishnaswami
Published: (2025)
Optimization methods for face recognition algorithmes
by: Sitkov, I.P., et al.
Published: (2025)
by: Sitkov, I.P., et al.
Published: (2025)
Face recognition based on machine learning algorithms
by: N. B. Shakhovska, et al.
Published: (2017)
by: N. B. Shakhovska, et al.
Published: (2017)
Algorithm flars and recognition of time series anomalies
by: Gvishiani, A.D., et al.
Published: (2004)
by: Gvishiani, A.D., et al.
Published: (2004)
On the problem of object recognition on devices with limited resources
by: Berdnyk, Y.M., et al.
Published: (2025)
by: Berdnyk, Y.M., et al.
Published: (2025)
Priorities for Social Vulnerability Reduction Policy
by: O. V. Makarova
Published: (2017)
by: O. V. Makarova
Published: (2017)
Vulnerability of complex network structures and systems
by: O. D. Polishchuk
Published: (2020)
by: O. D. Polishchuk
Published: (2020)
Aggregate signature protocol with group Leader
by: H. L. Kozina, et al.
Published: (2021)
by: H. L. Kozina, et al.
Published: (2021)
On the Signature of a Path in an Operator Algebra
by: Gilliers, Nicolas, et al.
Published: (2022)
by: Gilliers, Nicolas, et al.
Published: (2022)
Method for processing unstructured information on web resources
by: O. M. Trofymchuk, et al.
Published: (2022)
by: O. M. Trofymchuk, et al.
Published: (2022)
Algorithms of relationships and dependencies search in Web-pages
by: Glybovets, A.M.
Published: (2018)
by: Glybovets, A.M.
Published: (2018)
Algorithms of relationships and dependencies search in Web-pages
by: A. M. Hlybovets
Published: (2016)
by: A. M. Hlybovets
Published: (2016)
Interactive web maps: essence and the main stages of creation (on the example of the CARTO web resource)
by: O. M. Leiberiuk
Published: (2016)
by: O. M. Leiberiuk
Published: (2016)
Algebraic patterns of binary code vulnerabilities
by: Yakovlev, V.M.
Published: (2020)
by: Yakovlev, V.M.
Published: (2020)
Algebraic patterns of binary code vulnerabilities
by: V. M. Yakovlev
Published: (2020)
by: V. M. Yakovlev
Published: (2020)
Method of Accounting for the Influence of Modifiers on the Fuzzy Values of Linguistic Variables
by: S. G. Lelekov
Published: (2013)
by: S. G. Lelekov
Published: (2013)
Sign language automation through the deaf gesture recognition system
by: A. Z. Muslimova, et al.
Published: (2018)
by: A. Z. Muslimova, et al.
Published: (2018)
Computer(ized) linguistic resources at the L. Štúr Institute of Linguistics
by: Garabík, R.
Published: (2006)
by: Garabík, R.
Published: (2006)
Social vulnerability assessment: theoretical and methodological aspects
by: O. T. Ryndzak
Published: (2022)
by: O. T. Ryndzak
Published: (2022)
Automatic Recognition, Understanding and Synthesis of Speech Signals in Ukraine
by: T. K. Vintsiuk, et al.
Published: (2018)
by: T. K. Vintsiuk, et al.
Published: (2018)
Web service for enterprise resource management systems
by: Tarasenko, A.D., et al.
Published: (2022)
by: Tarasenko, A.D., et al.
Published: (2022)
Construction of the Corporate Web Resource General Structure
by: V. V. Zosimov
Published: (2019)
by: V. V. Zosimov
Published: (2019)
Algebraic Approach to Vulnerabilities Formalization in the Binary Code
by: O. O. Letychevskyi, et al.
Published: (2019)
by: O. O. Letychevskyi, et al.
Published: (2019)
Drug Therapy Fuzzy Model and Selection Algorithm
by: S. M. Seljakova
Published: (2014)
by: S. M. Seljakova
Published: (2014)
Signatures of noncommutativity in bar detectors of gravitational waves
by: S. Gangopadhyay, et al.
Published: (2019)
by: S. Gangopadhyay, et al.
Published: (2019)
Signatures of noncommutativity in bar detectors of gravitational waves
by: S. Gangopadhyay, et al.
Published: (2019)
by: S. Gangopadhyay, et al.
Published: (2019)
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Study of morphemics and derivation in the Russian and Czech linguistics through linguistic terminology: orientational and functional aspects
by: O. L. Ariskina, et al.
Published: (2015)
by: O. L. Ariskina, et al.
Published: (2015)
National localization of electronic signatures in modern office suites
by: Melashchenko, A.O.
Published: (2025)
by: Melashchenko, A.O.
Published: (2025)
Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building
by: Ogurtsov, M.I.
Published: (2023)
by: Ogurtsov, M.I.
Published: (2023)
Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building
by: Ogurtsov, M.I.
Published: (2022)
by: Ogurtsov, M.I.
Published: (2022)
Structural vulnerability and financial instability in Ukraine: global context
by: S. O. Korablin, et al.
Published: (2018)
by: S. O. Korablin, et al.
Published: (2018)
Human trafficking as a form of violence on vulnerable populations
by: O. I. Kotliar
Published: (2016)
by: O. I. Kotliar
Published: (2016)
Theoretical principles of use of ontologies for semantization of the Web resources
by: Rogushina, J.V.
Published: (2018)
by: Rogushina, J.V.
Published: (2018)
Similar Items
-
Improvement of the signature-system method by applying priority features in the signatures of monitoring objects to ensure maximum probability of their proper recognition
by: O. A. Iliashov, et al.
Published: (2020) -
Additional radar signature for waterborne object recognition
by: V. M. Horobets, et al.
Published: (2021) -
Automatic detection algorithm for vulnerability of SQL-injection
by: A. T. Rakhmanov, et al.
Published: (2019) -
Fuzzy underwater image recognition
by: V. H. Pysarenko, et al.
Published: (2018) -
An approach to constructing a mathematical model of the signature to determine the monitoring objects using the informativity of its monitoring features
by: O. A. Iliashov, et al.
Published: (2020)