Open Access
Issue |
E3S Web Conf.
Volume 140, 2019
International Scientific Conference on Energy, Environmental and Construction Engineering (EECE-2019)
|
|
---|---|---|
Article Number | 08005 | |
Number of page(s) | 4 | |
Section | Innovative Technologies for Technosphere Safety | |
DOI | https://doi.org/10.1051/e3sconf/201914008005 | |
Published online | 18 December 2019 |
- Maltsev D.N., Henson E.M., Repetsky D.S. 2019 Electronic textbooks for applied baccalaureate Higher education in Russia № 4, p. 134-141 [CrossRef] [Google Scholar]
- Deryabina S.A. and Dyakova T.A. 2019 Professiogram of a foreign language teacher in the digitalization of the educational space Higher education in Russia №4, p. 142-149 [Google Scholar]
- Khurum Nazir Junejo, David Yau 2016 Data Driven Physical Modeling for Intrusion Detection in Cyber Physical Systems Cryptology and Information Security Series, p.43 [Google Scholar]
- Hieu N. Tran, Robert H. Deng, HweeHwa Pang 2016 Privacy-Preserving and Verifiable Data Aggregation Cryptology and Information Security Series, p.115 [Google Scholar]
- Razinkina, E., Pankova, L., Trostinskaya, I., Pozdeeva, E., Evseeva, L., Tanova, A. Student satisfaction as an element of education quality monitoring in innovative higher education institution (2018) E3S Web of Conferences, 33, paper № 03043 [Google Scholar]
- Personalities. High School Technosphere Safety. [Electronic resource] URL: https://hsts.spbstu.ru/person/?paging=1 (access date: 03/31/2019) [Google Scholar]
- Rudskoy, A.I., Borovkov, A.I., Romanov, P.I. Russian experience in engineering education development (2018) Vysshee Obrazovanie v Rossii, 27 (1), pp. 151-162 [Google Scholar]
- Mohd Aizuddin Zainal Abidin, Anuar Nawawi, Ahmad Saiful Azlin Puteh Salin Customer data security and theft: a Malaysian organization’s experience Information and Computer Security, Vol. 27, iss. 1. [Google Scholar]
- Carl Young Information Security Science 1st Edition [Google Scholar]
- Harrison Stewart, Jan Jurjens Information security management and the human aspect in organizations Information and Computer Security, Vol. 25, iss. 5 [Google Scholar]
- Sychev V.M. Formalization of the model of the internal violator of information security [Google Scholar]
- Vasiliev, Y.S., Zegzhda, P.D., Kuvshinov, V.I. Modern problems of cybersecurity (2014) Nonlinear Phenomena in Complex Systems, 17 (3), pp. 210-214 [Google Scholar]
- Boltenkova E.A. Software to protect computer files from unauthorized access OS Windows Pr. Computer 2018664472 RU No. 2018661775 appl. 10.26.2018.11/16/2018 [Google Scholar]
- Skripnuk, D., Kikkas, K., Romashkina, E., E3S Web of Conferences, (2019) [Google Scholar]
- Voskresenskaya, E., Vorona-Slivinskaya, L., Mokhorov, D., Tebryaev, A., E3S Web of Conferences, (2019) [Google Scholar]
- Sokolova, O.A., Alloyarov, K.V., Baranova, T.A., ) IOP Conference Series: Earth and Environmental Science, (2019) [Google Scholar]
- Kulik, S.V., Travkina, E.V., Fedorov, A.S., Rubtsova, A.V., IOP Conference Series: Earth and Environmental Science, (2019) [Google Scholar]
- Alloyarova, Y., Alloyarov, K., Kuranova, L., Karpovich, I., IOP Conference Series: Earth and Environmental Science, (2019) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.