Global Attacks on Decentralized Systems Built on Peer-to-peer Networks
Saved in:
| Date: | 2017 |
|---|---|
| Main Author: | P. I. Stetsenko |
| Format: | Article |
| Language: | English |
| Published: |
2017
|
| Series: | Mathematical and computer modelling. Series: Technical sciences |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000813814 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Time-Released Cryptographic Protocol in Peer-to-Peer Network
by: S. A. Honchar
Published: (2015)
by: S. A. Honchar
Published: (2015)
The technologies of the Data Retrieval in Peer-to-Peer Networks Constructed on the Basis of the Distributed Hash Tables
by: A. V. Sergeev
Published: (2016)
by: A. V. Sergeev
Published: (2016)
A peer-to-peer topology and multicasting algorithm with guaranteed quality of experience
by: O. V. Gordijchuk, et al.
Published: (2015)
by: O. V. Gordijchuk, et al.
Published: (2015)
A peer-to-peer topology and multicasting algorithm with guaranteed quality of experience
by: Hordiichuk, O.V., et al.
Published: (2015)
by: Hordiichuk, O.V., et al.
Published: (2015)
Kievan peer gynt
by: H. Kovalenko
Published: (2014)
by: H. Kovalenko
Published: (2014)
A peer-to-peer topology and multicasting algorithm with guaranteed quality of experi-ence
by: Hordiichuk, O.V., et al.
Published: (2017)
by: Hordiichuk, O.V., et al.
Published: (2017)
Binary Trees Approach to Speedup Address Range Lookup in Peer-to-Peer Solutions
by: Poryev, G. V.
Published: (2013)
by: Poryev, G. V.
Published: (2013)
Functioning child with autism in the peer group in the public preschool
by: S. Nazaruk, et al.
Published: (2014)
by: S. Nazaruk, et al.
Published: (2014)
Recommendations on including peer reviewed open access journals in DOAJ
by: I. L. Kuchma, et al.
Published: (2016)
by: I. L. Kuchma, et al.
Published: (2016)
The role and place of peer assessment in teaching technical specialty students
by: S. M. Loboda, et al.
Published: (2022)
by: S. M. Loboda, et al.
Published: (2022)
Peers of independence: delinquent behavior of minors (1990s — early 2000s)
by: L. Kalashnikova, et al.
Published: (2021)
by: L. Kalashnikova, et al.
Published: (2021)
Peers of independence: delinquent behavior of minors (1990s — early 2000s)
by: L. Kalashnikova, et al.
Published: (2021)
by: L. Kalashnikova, et al.
Published: (2021)
Improved CARMA Locality Estimation Model for Peer List Reordering and Its Experimental Validation
by: Poryev, G.V., et al.
Published: (2011)
by: Poryev, G.V., et al.
Published: (2011)
Improved CARMA Locality Estimation Model for Peer List Reordering and Its Experimental Validation
by: G. V. Poryev, et al.
Published: (2011)
by: G. V. Poryev, et al.
Published: (2011)
Neural Network System for Transient Ischemic Attacks Diagnostics
by: V. A. Golovko, et al.
Published: (2014)
by: V. A. Golovko, et al.
Published: (2014)
Construction of subsystem determination of attacks in cyberphysical systems by neural network methods
by: O. Belej, et al.
Published: (2021)
by: O. Belej, et al.
Published: (2021)
Genetic algorithm for SDN protection against network attacks
by: S. I. Zabelin
Published: (2016)
by: S. I. Zabelin
Published: (2016)
Features of the Model of the Offender at the Analysis of Attacks on Global Internet Routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
SAR Processing Algorithm with Built-In Geometric Correction
by: Bezvesilniy, O.O., et al.
Published: (2011)
by: Bezvesilniy, O.O., et al.
Published: (2011)
Study of the development of built environment inclusiveness in Ukraine
by: Kryvomaz, Tetiana I., et al.
Published: (2024)
by: Kryvomaz, Tetiana I., et al.
Published: (2024)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
Complex of Cryoapparatus with Built-in Superconductive Solenoid for Magnetophysical and Electrophysical Research
by: I. P. Zharkov, et al.
Published: (2016)
by: I. P. Zharkov, et al.
Published: (2016)
Energy and turbulent wind flow characteristics in the built environment
by: V. G. Novikov
Published: (2015)
by: V. G. Novikov
Published: (2015)
Modeling of Attack Detection System based on Hybridization of Binary Classifiers
by: O. I. Belei, et al.
Published: (2020)
by: O. I. Belei, et al.
Published: (2020)
Hemostasis indices in transient ischemic attacks
by: I. A. Hryhorova, et al.
Published: (2021)
by: I. A. Hryhorova, et al.
Published: (2021)
ACTIVE SHIELDING OF EXTERNAL MAGNETIC FIELD OF BUILT-IN TRANSFORMER SUBSTATIONS
by: Rozov, V. Yu., et al.
Published: (2020)
by: Rozov, V. Yu., et al.
Published: (2020)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing
by: Yu. Zubok
Published: (2019)
by: Yu. Zubok
Published: (2019)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
A dialogue system based on ontology automatically built through a natural language text analysis
by: Litvin, A.A., et al.
Published: (2023)
by: Litvin, A.A., et al.
Published: (2023)
A dialogue system based on ontology automatically built through a natural language text analysis
by: Litvin, A.A., et al.
Published: (2022)
by: Litvin, A.A., et al.
Published: (2022)
Changes of strength and deformation indexes of ground at dynamic loadings on built-up territories
by: T. V. Kril
Published: (2011)
by: T. V. Kril
Published: (2011)
MAXIMIZING THE GENERATION VOLUMES OF SOLAR POWER PLANTS BUILT ON THE TERRITORY OF INDUSTRIAL ENTERPRISES
by: Kachan , Yu., et al.
Published: (2026)
by: Kachan , Yu., et al.
Published: (2026)
Construction of a multi-agent attack detection system based on artificial intelligence models
by: O. Belej, et al.
Published: (2021)
by: O. Belej, et al.
Published: (2021)
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019)
by: V. D. Havlovskyi
Published: (2019)
Simulation and Visualization of Cyber Attacks in the Energy Sector Using Computer Distributed Training Systems
by: V. A. Gureev, et al.
Published: (2019)
by: V. A. Gureev, et al.
Published: (2019)
Global Trends in Public Management of Territorial Development in the Context of Decentralization of Power
by: I. V. Yaroshenko, et al.
Published: (2020)
by: I. V. Yaroshenko, et al.
Published: (2020)
World experience of development of information biographical systems in the global network
by: Yu. V. Vernik
Published: (2020)
by: Yu. V. Vernik
Published: (2020)
Similar Items
-
Time-Released Cryptographic Protocol in Peer-to-Peer Network
by: S. A. Honchar
Published: (2015) -
The technologies of the Data Retrieval in Peer-to-Peer Networks Constructed on the Basis of the Distributed Hash Tables
by: A. V. Sergeev
Published: (2016) -
A peer-to-peer topology and multicasting algorithm with guaranteed quality of experience
by: O. V. Gordijchuk, et al.
Published: (2015) -
A peer-to-peer topology and multicasting algorithm with guaranteed quality of experience
by: Hordiichuk, O.V., et al.
Published: (2015) -
Kievan peer gynt
by: H. Kovalenko
Published: (2014)