Abstract is missing.
- Using Blockchain for Reputation-Based Cooperation in Federated IoT DomainsGiancarlo Fortino, Fabrizio Messina, Domenico Rosaci, Giuseppe M. L. Sarné. 3-12 [doi]
- Design of Fail-Safe Quadrocopter ConfigurationOleg V. Baranov, Nikolay V. Smirnov, Tatiana E. Smirnova, Yefim V. Zholobov. 13-22 [doi]
- CAAVI-RICS Model for Analyzing the Security of Fog Computing SystemsSasa Pesic, Milos Radovanovic, Mirjana Ivanovic, Costin Badica, Milenko Tosic, Ognjen Ikovic, Dragan Boskovic. 23-34 [doi]
- Conceptual Model of Digital Platform for Enterprises of Industry 5.0Vladimir Gorodetsky, Vladimir Larukchin, Petr Skobelev. 35-40 [doi]
- Conceptual Data Modeling Using Aggregates to Ensure Large-Scale Distributed Data Management Systems SecurityMaria A. Poltavtseva, Maxim O. Kalinin. 41-47 [doi]
- Smart Topic Sharing in IoT Platform Based on a Social Inspired BrokerVincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni. 48-55 [doi]
- Easy Development of Software for IoT SystemsIchiro Satoh. 56-61 [doi]
- Privacy-Preserving LDA Classification over Horizontally Distributed DataFatemeh Khodaparast 0002, Mina Sheikhalishahi, Hassan Haghighi, Fabio Martinelli. 65-74 [doi]
- Improving Parallel Data Mining for Different Data Distributions in IoT SystemsIvan Kholod, Andrey Shorov, Sergei Gorlatch. 75-85 [doi]
- An Experiment on Automated Requirements Mapping Using Deep Learning MethodsFelix Petcusin, Liana Stanescu, Costin Badica. 86-95 [doi]
- Using the Doc2Vec Algorithm to Detect Semantically Similar Jira Issues in the Process of Resolving Customer RequestsArtem Kovalev, Nikita Voinov, Igor Nikiforov. 96-101 [doi]
- evoRF: An Evolutionary Approach to Random ForestsDiogo Ramos, Davide Carneiro, Paulo Novais. 102-107 [doi]
- The Method of Fuzzy Logic and Data Mining for Monitoring Troposphere Parameters Using Ground-Based Radiometric ComplexS. I. Ivanov, G. N. Ilin. 108-114 [doi]
- Actor-Network Approach to Self-organisation in Global Logistics NetworksYury Iskanderov, Mikhail Pautov. 117-127 [doi]
- Multi-agent System for Simulation of Response to Supply Chain DisruptionsJing Tan, Rongjun Xu, Kai Chen, Lars Braubach, Kai Jander, Alexander Pokahr. 128-139 [doi]
- Data Warehouse Design for Security Applications Using Distributed Ontology-Based Knowledge RepresentationMaria A. Butakova, Andrey V. Chernov, Ilias K. Savvas, Georgia Garani. 140-145 [doi]
- Exploring the Space of Block Structured Scheduling Processes Using Constraint Logic ProgrammingAmelia Badica, Costin Badica, Mirjana Ivanovic, Doina Logofatu. 149-159 [doi]
- Global and Private Job-Flow Scheduling Optimization in Grid Virtual OrganizationsVictor V. Toporkov, Anna S. Toporkova, Dmitry Yemelyanov. 160-169 [doi]
- Type-Based Genetic AlgorithmsRoman A. Sizov, Dan A. Simovici. 170-176 [doi]
- Distributed Construction of a Level Class Description in the Framework of Logic-Predicate Approach to AI ProblemsTatiana M. Kosovskaya. 177-182 [doi]
- On Approaches for Solving Nonlinear Optimal Control ProblemsAlina V. Boiko, Nikolay V. Smirnov. 183-188 [doi]
- Hierarchical Simulation of Onboard NetworksValentin Olenev, Irina Lavrovskaya, Ilya Korobkov, Nikolay Sinyov, Yuriy Sheynin. 191-196 [doi]
- Strategies Comparison in Link Building ProblemVincenza Carchiolo, Marco Grassia, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni. 197-202 [doi]
- Research of the Possibility of Hidden Embedding of a Digital Watermark Using Practical Methods of Channel SteganographyPavel I. Sharikov, Andrey V. Krasov, Artem M. Gelfand, Nikita A. Kosov. 203-209 [doi]
- A Highly Scalable Index Structure for Multicore In-Memory Database SystemsHitoshi Mitake, Hiroshi Yamada, Tatsuo Nakajima. 210-217 [doi]
- Applying the Split-Join Queuing System Model to Estimating the Efficiency of Detecting Contamination Content Process in Multimedia Objects StreamsVladimir Lokhvickii, Yuri Ryzhikov, Andry Dudkin. 218-223 [doi]
- On the Applicability of the Modernized Method of Latent-Semantic Analysis to Identify Negative Content in Multimedia ObjectsSergey Krasnov, Vladimir Lokhvitckii, Andry Dudkin. 224-229 [doi]
- Digital Subjects as New Power Actors: A Critical View on Political, Media-, and Digital Spaces IntersectionDmitry Gavra, Vladislav Dekalov, Ksenia Naumenko. 233-243 [doi]
- An Approach to Creating an Intelligent System for Detecting and Countering Inappropriate Information on the InternetLidiya Vitkova, Igor Saenko, Olga Tushkanova. 244-254 [doi]
- A Note on Analysing the Attacker Aims Behind DDoS AttacksAbhishta Abhishta, Marianne Junger, Reinoud Joosten, Lambert J. M. Nieuwenhuis. 255-265 [doi]
- Formation of the System of Signs of Potentially Harmful Multimedia ObjectsSergey Pilkevich, Konstantin Gnidko. 266-271 [doi]
- Soft Estimates for Social Engineering Attack Propagation Probabilities Depending on Interaction Rates Among Instagram UsersAnastasiia O. Khlobystova, Maxim V. Abramov, Alexander L. Tulupyev. 272-277 [doi]
- Development of the Complex Algorithm for Web Pages Classification to Detection Inappropriate Information on the InternetDiana Gaifulina, Andrey Chechulin. 278-284 [doi]
- Approach to Identification and Analysis of Information Sources in Social NetworksLidia Vitkova, Maxim Kolomeets. 285-293 [doi]
- The Architecture of Subsystem for Eliminating an Uncertainty in Assessment of Information Objects' Semantic Content Based on the Methods of Incomplete, Inconsistent and Fuzzy Knowledge ProcessingIgor Parashchuk, Elena Doynikova. 294-301 [doi]
- The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content ProcessingAlexander Branitskiy, Elena Doynikova, Igor V. Kotenko, Natalia Krasilnikova, Dmitry Levshun, Artem Tishkov, Nina Vanchakova. 302-310 [doi]
- Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity InfrastructureDiana Berbecaru, Antonio Lioy, Cesare Cameroni. 313-322 [doi]
- Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management SystemsVasily Desnitsky, Nikolay Rudavin, Igor V. Kotenko. 323-332 [doi]
- The Integrated Model of Secure Cyber-Physical Systems for Their Design and VerificationDmitry Levshun, Igor V. Kotenko, Andrey Chechulin. 333-343 [doi]
- Scalable Data Processing Approach and Anomaly Detection Method for User and Entity Behavior Analytics PlatformAlexey Lukashin, Mikhail Popov, Anatoliy Bolshakov, Yuri Nikolashin. 344-349 [doi]
- Approach to Detection of Denial-of-Sleep Attacks in Wireless Sensor Networks on the Base of Machine LearningAnastasia Balueva, Vasily Desnitsky, Igor Ushakov. 350-355 [doi]
- Model of Smart Manufacturing SystemMaria Usova, Sergey Chuprov, Ilya I. Viksnin, Ruslan Gataullin, Antonina Komarova, Andrey Iuganson. 356-362 [doi]
- Technology Resolution Criterion of Uncertainty in Intelligent Distributed Decision Support SystemsAlexsander N. Pavlov, Dmitry A. Pavlov, Valerii V. Zakharov. 365-373 [doi]
- Satellite Constellation Control Based on Inter-Satellite Information InteractionOleg Karsaev, Evgeniy Minakov. 374-384 [doi]
- Load Balancing Cloud Computing with Web-Interface Using Multi-channel Queuing Systems with Warming up and CoolingMaad M. Khalill, Anatoly D. Khomonenko, Sergey I. Gindin. 385-393 [doi]
- Application of Cyber-Physical System and Real-Time Control Construction Algorithm in Supply Chain Management ProblemInna Trofimova, Boris V. Sokolov, Dmitry Nazarov, Semyon A. Potryasaev, Andrey Musaev, Vladimir Kalinin. 394-403 [doi]
- Method for Design of 'smart' Spacecraft Onboard Decision Making in Case of Limited Onboard ResourcesAndrey Tyugashev, Sergei Orlov. 404-413 [doi]
- Intelligent Technologies and Systems for Spatial Industrial Strategic PlanningElena Serova. 414-422 [doi]
- Conceptual and Formal Models of Information Technologies Use for Decisions Support in Technological SystemsAlexander S. Geyda. 423-429 [doi]
- Role and Future of Standards in Development of Intelligent and Dependable Control Software in Russian Space IndustryAndrey Tyugashev, Alexander Kovalev, Vjacheslav Pjatkov. 430-436 [doi]
- Improved Particle Swarm Medical Image Segmentation Algorithm for Decision MakingSamer El-Khatib, Yuri A. Skobtsov, Sergey Rodzin. 437-442 [doi]
- Collecting and Processing Distributed Data for Decision Support in Social EcologyDmitry N. Verzilin, Tatyana Maximova, Irina Sokolova. 443-448 [doi]
- Evaluation of the Dynamics of Phytomass in the Tundra Zone Using a Fuzzy-Opportunity ApproachV. V. Mikhailov, Alexandr V. Spesivtsev, Andrey Yu. Perevaryukha. 449-454 [doi]
- Lower Limbs Exoskeleton Control System Based on Intelligent Human-Machine InterfaceIldar Kagirov, Alexey Karpov 0001, Irina S. Kipyatkova, Konstantin Klyuzhev, Alexander Kudryavcev, Igor Kudryavcev, Dmitry Ryumin. 457-466 [doi]
- Central Audio-Library of the University of Novi SadVlado Delic, Dragisa Miskovic, Branislav M. Popovic, Milan Secujski, Sinisa Suzic, Tijana Delic, Niksa Jakovljevic. 467-476 [doi]
- Applying Ensemble Learning Techniques and Neural Networks to Deceptive and Truthful Information Detection Task in the Flow of SpeechAlena Velichko, Viktor Budkov, Ildar Kagirov, Alexey Karpov 0001. 477-482 [doi]
- Model Checking to Detect the Hummingbad MalwareFabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Gigliola Vaglini. 485-494 [doi]
- ECU-Secure: Characteristic Functions for In-Vehicle Intrusion DetectionYannick Chevalier, Roland Rieke, Florian Fenzl, Andrey Chechulin, Igor V. Kotenko. 495-504 [doi]
- Experimenting with Machine Learning in Automated Intrusion ResponseAndre Lopes, Andrew Hutchison. 505-514 [doi]
- Method of Several Information Spaces for Identification of AnomaliesAlexander A. Grusho, Nick A. Grusho, Elena E. Timonina. 515-520 [doi]
- Gateway for Industrial Cyber-Physical Systems with Hardware-Based Trust AnchorsDiethelm Bienhaus, Lukas Jäger, Roland Rieke, Christoph Krauß. 521-528 [doi]
- The Architecture of the System for Monitoring the Status in Patients with Parkinson's Disease Using Mobile TechnologiesShichkina Yulia, Kataeva Galina, Irishina Yulia, Stanevich Elizaveta. 531-540 [doi]
- Approach to Association and Classification Rules VisualizationYana Bekeneva, Vladimir Mochalov, Andrey Shorov. 541-546 [doi]
- The Visualization-Driven Approach to the Analysis of the HVAC DataEvgenia Novikova, Mikhail Bestuzhev, Andrey Shorov. 547-552 [doi]