Cited By
View all- Shevchenko SZhdanovа YSpasiteleva SMazur NSkladannyi PNehodenko V(2024)MATHEMATICAL METHODS IN CYBER SECURITY: CLUSTER ANALYSIS AND ITS APPLICATION IN INFORMATION AND CYBERNETIC SECURITYCybersecurity: Education, Science, Technique10.28925/2663-4023.2024.23.2582733:23(258-273)Online publication date: 2024
- Levonevskiy DMotienko AVinogradov M(2022)Approach to Physical Access Management, Control and Analytics Using Multimodal and Heterogeneous Data2022 15th International Conference on Security of Information and Networks (SIN)10.1109/SIN56466.2022.9970498(01-04)Online publication date: 11-Nov-2022
- Wang JLiu JXia ZChen PLi XChen X(2022)Semi-supervised Labeling Model Based on Gaussian Mixture in the Context of E-commerce Price Fraud2022 4th International Conference on Robotics and Computer Vision (ICRCV)10.1109/ICRCV55858.2022.9953227(300-304)Online publication date: 25-Sep-2022
- Show More Cited By