Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings
Rak, Jacek, Bay, John, Kotenko, Igor, Popyack, Leonard, Skormin, Victor, Szczypiorski, Krzysztof
Year of Publication 2017
Get full text
Year of Publication 2017
eBook
Laser Communication Between Mobile Platforms
Sofka, J., Nikulin, V.V., Skormin, V.A., Hughes, D.H., Legare, D.J.
Published in IEEE transactions on aerospace and electronic systems (01.01.2009)
Published in IEEE transactions on aerospace and electronic systems (01.01.2009)
Get full text
Journal Article
High-torque density integrated electro-mechanical flight actuators
Lyshevski, S.E., Skormin, V.A., Colgren, R.D.
Published in IEEE transactions on aerospace and electronic systems (01.01.2002)
Published in IEEE transactions on aerospace and electronic systems (01.01.2002)
Get full text
Journal Article
ICS security testbed with delay attack case study
Korkmaz, Emrah, Dolgikh, Andrey, Davis, Matthew, Skormin, Victor
Published in MILCOM 2016 - 2016 IEEE Military Communications Conference (01.11.2016)
Published in MILCOM 2016 - 2016 IEEE Military Communications Conference (01.11.2016)
Get full text
Conference Proceeding
Autonomous Intelligent Systems: Agents and Data Mining: International Workshop, AIS-ADM 2005, St. Petersburg, Russia, June 6-8, 2005. Proceedings
Year of Publication 2005
Get full text
Conference Proceeding
Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments
Dolgikh, Andrey, Birnbaum, Zachary, Yu Chen, Skormin, Victor
Published in 2013 IEEE 14th International Conference on Mobile Data Management (01.06.2013)
Published in 2013 IEEE 14th International Conference on Mobile Data Management (01.06.2013)
Get full text
Conference Proceeding
Resident Security System for Government/Industry Owned Computers
Davis, Matthew, Korkmaz, Emrah, Dolgikh, Andrey, Skormin, Victor
Published in Computer Network Security (2017)
Published in Computer Network Security (2017)
Get full text
Book Chapter