|
|
Publications in Math-Net.Ru |
Citations |
|
2009 |
1. |
Ph. G. Nesteruk, L. G. Nesteruk, G. F. Nesteruk, “Application of the formal model for describing processes of adaptive information security in computer-aided systems”, Avtomat. i Telemekh., 2009, no. 3, 160–171 ; Autom. Remote Control, 70:3 (2009), 491–501 |
3
|
2. |
L. G. Nesteruk, Ph. G. Nesteruk, G. F. Nesteruk, “On modeling neural-network protection facilities for computer-aided systems: a formal model of adaptation and operation. II”, Avtomat. i Telemekh., 2009, no. 2, 122–141 ; Autom. Remote Control, 70:2 (2009), 283–300 |
|
2008 |
3. |
G. F. Nesteruk, L. G. Nesteruk, Ph. G. Nesteruk, “Modeling of neural-network security tools for computer-aided systems: A formal model of adaptation and operation. I”, Avtomat. i Telemekh., 2008, no. 9, 170–182 ; Autom. Remote Control, 69:9 (2008), 1603–1614 |
2
|
|
Organisations |
|
|