Skip to content
Scientific and practical cyber security journal | ISSN 2587-4667
KA
RU
Home page
About journal
Issues archive
Author guidelines
Terms & conditions
User license
Contact us
Menu
Home page
About journal
Issues archive
Author guidelines
Terms & conditions
User license
Contact us
Categories: Network security
MODERN THREATS OF CORPORATE NETWORKS
CONCEPTS, APPLICATIONS, AND CHALLENGES OF THE INTERNET OF THINGS
ASSESSMENT OF LOCATION BASED THREATS FOR DEVICES- A CASE STUDY OF 5G NETWORK
RESOURCE ORCHESTRATION IN 5G TECHNOLOGIES
LINKS BETWEEN 5G PPP PROJECTS: THE ROAD FROM THE PAST TO THE FUTURE
INTRUSION DETECTION SYSTEM FOR 5G
VIRTUAL ASSISTANTS & ARTIFICIAL INTELLIGENCE: TRANSFORMING DIGITAL CENSORSHIP
ATTACKS ON WIRELESS NETWORKS AND THEIR PREVENTIONS
THE ANALYSIS OF THE DIFFERENCE OF 4G AND 5G SECURITIES.
ПОВЫШЕНИЕ ЭФФЕКТИВНОСТИ ВЫЯВЛЕНИЯ СЕТЕВЫХ АТАК ЗА СЧЕТ АЛГОРИТМОВ РАСПОЗНАВАНИЯ ВРЕДОНОСНОГО ТРАФИКА
Posts navigation
Older Posts
Older Posts