Access the full text.
Sign up today, get DeepDyve free for 14 days.
A.A. Talalaev, I.P. Tishchenko, V.M. Khachumov, V.P. Fralenko (2011)
Development of a neural network monitoring module for abnormal network activityNeirokomp’yut.: Razrab. Primen., 7
P.A. Bernstein, V. Hadzilacos, N. Goodman (1987)
Concurrency Control and Recovery in Database Systems
W.R. Ashby (2015)
An Introduction to Cybernetics
A. Miklashevskaya (2016)
Internet of Things can be deadly dangerous
S. Gaivoronski, D. Gamayunov (2013)
Proceedings of the 7th Spring/Summer Young Researchers’ Colloquium on Software Engineering (SYRCoSE 2013), Kazan
G. Reese (2009)
Cloud Application Architectures: Building Applications and Infrastructure in the Cloud
S. Legg, M. Hutter (2007)
Universal intelligence: A definition of machine intelligenceMinds Mach., 17
S.A. Gaivoronskaya (2014)
Investigation of methods for detecting shellcodes in high-speed data channels
R. Reitblatt, N. Foster, J. Rexford, D. Walker (2011)
Consistent updates for software-defined networks: Change you can believe in!HOTNETS '11, 7
S. Legg, M. Hutter (2007)
A Collection of Definitions of Intelligence. Technical Report. IDSIA-07-07
A.A. Grusho, M.I. Zabezhailo, A.A. Zatsarinnyi, V.O. Piskovskii (2016)
Secure automatic reconfiguration of cloud computing environmentsSist. Sredstva Inf., 26
V.A. Volkov (2015)
Analysis of threats and methods of protection of cloud servicesMolodii Vchenii, 12
T. M. Conolly, C.E. Begg (1999)
Database Systems. A Practical Approach to Design, Implementation, and Management
K. Bulanov (2016)
The media learned about Russian bank losing 100 million rubles after cyber attack
A.A. Grusho, M.I. Zabezhailo, A.A. Zatsarinnyi, V.O. Piskovskii, S.V. Borokhov (2015)
On the potential applications of data mining for information security provision of cloud-based environmentsAutom. Doc. Math. Linguist., 49
A.A. Grusho, M.I. Zabezhailo, A.A. Zatsarinnyi (2016)
One method of reducing computations in the formation of Galois closuresInf. Primen., 10
I. Kholod, I. Petuhov, N. Kapustin (2015)
Creation of data mining cloud service on the actor modeInternet Things, Smart Spaces, Next Gener. Networks Syst., 9247
L.S. Kramarov, L.K. Babenko (2013)
Detection of network attacks and selection of countermeasures in cloud systemsIzv. YuFU, Tekh. Nauki, 12
S. Revilak, P. O’Neil, E. O’Neil (2011)
Proceedings of the 2011 IEEE 27th International Conference on Data Engineering, IEEE
A.A. Grusho, M.I. Zabezhailo, A.A. Zatsarinnyi (2015)
Control and management of information flows in the cloud environmentInf. Primen., 9
R. McGeer (2013)
Proc. of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
M. Reitblatt, N. Foster, J. Rexford, C. Schlesinger, D. Walker (2012)
Proc. Assoc. for Compt. Mach. SIGCOMM Conf.
A.M. Turing (1950)
Computing machinery and intelligenceMind, 59
A. Koshkarov (2016)
Hackers stole more than 1 billion rubles from banks within half a year
H. Berenson, P. Bernstein, J. Gray, J. Melton, E. O’Neil, P. O’Neil (1995)
Proc. 1995 ACM SIGMOD International Conference on Management of Data
F.Y. Rashid (2016)
InfoWorld (IDG), Mar. 11
A.N. Tikhonov (1969)
The Great Soviet Encyclopedia
R. McGeer (2016)
IEEE Security and Privacy Workshops
K. Borisenko, A. Rukavitsyn, A. Gurtov, A. Shorov (2016)
Internet Things, Smart Spaces, Next Gener. Networks Syst.
P. Eswaran, J. Gray, R. Lorie, I. Traiger (1976)
The notions of consistency and predicate locks in a database systemCommun. ACM, 19
K. Scarfone, P. Mell (2012)
Guide to Intrusion Detection and Prevention Systems (IDPS)
Yu.G. Emel'yanova, V.P. Fralenko (2011)
Analysis of problems and prospects for the creation of an intelligent system for detecting and preventing network attacks on cloud computingProgram. Sist.: Teor. Prilozh., 4
A.N. Tikhonov (1943)
On the stability of inverse problemsDokl. AN SSSR, 39
P. O’Neil (1994)
Database: Principles, Programming, Performance
C. Anley, J. Heasman, F. Linder, G. Richarte (2007)
The Shellcoder’s Handbook. Discovering and Exploiting Security Holes
V. Goryacheva (2016)
Sberbank will be protected on-line
I.V. Petukhov (2016)
Cand. Sci. (Eng.) Dissertation, St. Petersburg: LETI
G. Varghese (2004)
Papers from the Proceedings of the 17th NACCQ 2004
An overview of data-mining technologies used in applied information security systems is presented. The focus is made on a new and actively developing trend, cloud-computing media (including the socalled fog computing). The status and promising opportunities of using artificial intelligence models and methods to solve information security problems are also discussed.
Automatic Documentation and Mathematical Linguistics – Springer Journals
Published: Jul 21, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.