Journals
Books
Articles by keyword intrusion detection
Models of Logical Relations and Application for Detecting Intrusions in Computer Systems
A.V. Agafonov, A.N. Savinykh
Popper-s criterion vs. information security research
D.Y. Gamayunov
Modern network threat protection - is security real?
D.V. Ushakov
Signaling reliability of binary combined intrusion detection system

S.S. Zwierzynski¹, E.I. Dukhan², I.V. Parfentsev³, D.G. Lvov4

1 Moscow Technical University of Communication and Informatics (Moscow, Russia)

2 Ural Federal University (Ekaterinburg, Russia)

3 JSC “STT Group” (Moscow, Russia)

4 JSC “Dedal”(Dubna, Moscow Region, Russia)

Generalized technique for assessing intrusion detection system potential characteristics based on the machine experiment method

E.I. Dukhan, S.V. Voevodin, V.Yu. Sazonov, S.S. Zwierzynski

Signal formation simulation technique for intrusion detection systems

E.I. Duhan – Ph.D.(Eng.), Associate Professor

Algorithmic technique implementation for leaky-wave ported coax based intrusion detection system signal formation mathematical model development

.I. Duhan – Ph.D.(Eng.), Associate Professor 

S.V. Voevodin – Post-graduate Student 

Mathematical model of signal formation in a single-cable detection device based on a leaky-wave ported coax

E.I. Dukhan – Ph.D.(Eng.), Associate Professor

K.A. Nagaev – Post-graduate Student

Adaptive binary combined intrusion detection system

S.S. Zwierzynski, E.I. Dukhan, K.A. Nagayev, A.N. Averkiev