|
|
Publications in Math-Net.Ru |
Citations |
|
2018 |
1. |
A. A. Grusho, N. A. Grusho, M. V. Levykin, E. E. Timonina, “Methods of identification of host capture in a distributed information system which is protected on the basis of meta data”, Inform. Primen., 12:4 (2018), 39–43 |
3
|
|
2014 |
2. |
M. V. Levykin, M. I. Tronenko, I. V. Shidlovsky-Moskvin, “The propagation method by means of an attack of the “man-in-the-middle” type in the DHCP protocol”, Sistemy i Sredstva Inform., 24:4 (2014), 100–110 |
|
2013 |
3. |
M. V. Levykin, “New principles of modeling of autonomous self-propagating malware”, Sistemy i Sredstva Inform., 23:1 (2013), 14–26 |
1
|
|
2011 |
4. |
M. V. Levykin, “New features of self-propagating malware”, Sistemy i Sredstva Inform., 21:2 (2011), 69–72 |
3
|
|
Organisations |
|
|