Mathematical Model for Finding Probability of Detecting Victims of Man-Made Disasters Using Distributed Computer System with Reconfigurable Structure and …
Issues related to the development of a method for planning the stages of rescuing victims of
man-made disasters using computer distributed systems with programmable logic and a …
man-made disasters using computer distributed systems with programmable logic and a …
Scenarios for implementation of nested virtualization technology in task of improving cloud firewall fault tolerance
Currently, the use of cloud firewalls allows protecting not only individual network resources,
but also the entire infrastructure of large data centers. The main requirement for a cloud …
but also the entire infrastructure of large data centers. The main requirement for a cloud …
Потокові моделі та методи маршрутизації в інфокомунікаційних мережах: відмовостійкість, безпека, масштабованість
ОВ Лемешко, ОС Єременко, ОС Невзорова - 2020 - openarchive.nure.ua
Анотація Монографія присвячена питанням, пов'язаним із синтезом математичних
моделей і методів маршрутизації, які б слугували подальшою теоретичною основою …
моделей і методів маршрутизації, які б слугували подальшою теоретичною основою …
Investigation of the IoT device lifetime with secure data transmission
This paper represents the approach for estimation of the lifetime of the IoT end devices. The
novelty of this approach is in the taking into account not only the energy consumption for …
novelty of this approach is in the taking into account not only the energy consumption for …
The methods to improve quality of service by accounting secure parameters
A solution to the problem of ensuring quality of service, providing a greater number of
services with higher efficiency taking into account network security is proposed. In this …
services with higher efficiency taking into account network security is proposed. In this …
Method of building dynamic multi-hop VPN chains for ensuring security of terminal access systems
International business groups are increasingly using terminal systems as workstations. At
the same time, virtual machine servers are often located in the head structure, while remote …
the same time, virtual machine servers are often located in the head structure, while remote …
Methods for calculating the performance indicators of ip multimedia subsystem (IMS)
Today, Ukraine is actively working on solving the problems of convergence of networks of
various technologies, ensuring their compatibility in management, signaling and data traffic …
various technologies, ensuring their compatibility in management, signaling and data traffic …
Design and research of the model for secure traffic engineering fast ReRoute under traffic policing approach
The work is devoted to the design and research of the mathematical model for Secure Traffic
Engineering Fast ReRoute under Traffic Policing (Secure TE-FRR-TP) approach. The task of …
Engineering Fast ReRoute under Traffic Policing (Secure TE-FRR-TP) approach. The task of …
Investigation of the secure paths set calculation approach based on vulnerability assessment
M Yevdokymenko, O Yeremenko, A Shapovalova… - 2021 - openarchive.nure.ua
Анотація An approach to the calculation of secure paths based on the routing model taking
into account information security risks using the basic vulnerability criticality metrics is …
into account information security risks using the basic vulnerability criticality metrics is …
Моделювання та оптимізація процесів безпечної та відмовостійкої маршрутизації в телекомунікаційних мережах
Анотація Монографія присвячена розв'язанню задач, пов'язаних із розробленням
математичних моделей для оптимізації процесів безпечної та відмовостійкої …
математичних моделей для оптимізації процесів безпечної та відмовостійкої …