Open Access
Issue
E3S Web Conf.
Volume 431, 2023
XI International Scientific and Practical Conference Innovative Technologies in Environmental Science and Education (ITSE-2023)
Article Number 05017
Number of page(s) 12
Section IT and Mathematical Modeling in the Environment
DOI https://doi.org/10.1051/e3sconf/202343105017
Published online 13 October 2023
  1. E. A. Kasyuk, Development of conceptual approaches to understanding the essence of the category ‘Controlling’, Herald of Siberian Institute of Business and Information Technologies, 11, 106-110 (2022) doi:10.24412/2225-8264-2022-4-106-110 [Google Scholar]
  2. L. Reny, Y. Ren, Oracle Hyperion FDMEE Basics: A Step-by-Step Study Guide for FDMEE Entry-Level Professionals (Hyperion Step by Step), Independently published (2020) [Google Scholar]
  3. O. L. Golubeva, Analysis of the modern ERP systems functionality, Management in modern system, 3(35), 43-58 (2022) doi:10.24412/2311-1313-35-43-5 [Google Scholar]
  4. F. Franzen, L. Steger, J. Zirngibl, P. Sattler, Looking for Honey Once Again: Detecting RDP and SMB Honeypots on the Internet, in Proceedings of the 2022 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW, 06-10 June 2022, Genoa, Italy (2022) doi:10.1109/EuroSPW55150.2022.00033 [Google Scholar]
  5. Y. Kraev, G. Firsov, D. Kandakov, Authentication via RDP Using Electronic Identifiers, in Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus, 26-29 January 2021, St.Petersburg, Moscow, Russia (2021) doi:10.1109/ElConRus51938.2021.9396471 [Google Scholar]
  6. A. Jain, S. Bhullar, Network performance evaluation of smart distribution systems using smart meters with TCP/IP communication protocol, Energy Reports, 8, 19-34, (2022) doi:10.1016/j.egyr.2022.05.108 [CrossRef] [Google Scholar]
  7. N. B. Daimen, V. a-p Selvarajah, Jamming Windows OS Through DDoS, in Proceedings of the 2022 IEEE 2nd Mysore Sub Section International Conference, MysuruCon, 16-17 October 2022, Mysuru, India (2022) doi: 10.1109/MysuruCon55714.2022.9972619 [Google Scholar]
  8. J. Carrillo-Mondéjar, J. L. Martinez, G. Suarez-Tangil, On how VoIP attacks foster the malicious call ecosystem, Computers & Security, 119, 102758 (2022) doi: 10.1016/j.cose.2022.102758 [CrossRef] [Google Scholar]
  9. K. G. Mehrotra, C. K. Mohan, H. Huang, Anomaly Detection Principles and Algorithms (Terrorism, Security, and Computation), Springer (2018) [Google Scholar]
  10. M. S. Tok, M. Demirci, Security Analysis of SDN controller-based DHCP services and attack mitigation with DHCPguard, Computers & Security, 109, 102394 doi: 10.1016/j.cose.2021.102394 (2021) [CrossRef] [Google Scholar]
  11. E. R. Estaño, L. E. Wiesse, C. A. Goyzueta, IPv6 Plug and play business firewall design based on Iptables, Nettop and linux, in Proceedings of the 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering, ICECCME, 07-08 October 2021, Mauritius, Mauritius (2021) doi: 10.1109/ICECCME52200.2021.9591064 [Google Scholar]
  12. P. L. S. Kumari, C. H. S. devi, S. Thivaharan, K. Srinivas, A. Damodaram, A resilient group session key authentication methodology for secured peer to peer networks using Zero knowledge protocol, Optik, 273, 170345 (2023) doi:10.1016/j.ijleo.2022.170345 [CrossRef] [Google Scholar]
  13. A. Zaenchkovski, A. Lazarev, D. Tukaev, V. Epifanov, Intelligent Information Flow Management System in innovative scientific and industrial clusters, IJPEDS, 37, 303-317 (2022) doi: 10.1080/17445760.2022.2060976 [Google Scholar]
  14. L. Xuyuan, T. Lihua, L. Chen, TCTG:a controllable text generation method using text to control text generation, in Proceedings of the 2021 IEEE 6th International Conference on Signal and Image Processing, ICSIP, 22-24 October 2021, Nanjing, China, (2022) doi:10.1109/ICSIP52628.2021.9688767 [Google Scholar]
  15. O. Arana, H. Benítez-Pérez, J. Gomez, M. Lopez-Guerrero, Never Query Alone: A distributed strategy to protect Internet users from DNS fingerprinting attacks, Computer Networks, 199, 108445 (2021) doi:10.1016/j.comnet.2021.108445 [CrossRef] [Google Scholar]
  16. J. Keijser. OpenVPN Cookbook. 2nd edition, Packt (2017) [Google Scholar]
  17. Z. Aouini, A. Pekar, NFStream, Computer Networks, 204, 108719 (2022) DOI: 10.1016/j.comnet.2021.108719 [CrossRef] [Google Scholar]
  18. M. I. Dli, Y. V. Sinyavsky, E. I. Rysina, M. A. Vasilkova, A method for classifying mixing devices using deep neural networks with an expanded receptive field, Journal of Applied Informatics, 17, 51-61 (2022) doi:10.37791/2687-0649-2022-17-5-51-61 [CrossRef] [Google Scholar]
  19. B. Ren, L. Chen, H. Ma, X. Xue, A robust short-term wind power forecasting algorithm based on LSTM-XGBoost model, in Proceedings of the 2021 IEEE 5th Conference on Energy Internet and Energy System Integration, El2, 22-24 October 2021, Taiyuan, China (2022) doi:10.1109/EI252483.2021.9713102 [Google Scholar]
  20. I. Palari, A. Karanikola, S. Kotsiantis. A comparison of the optimized LSTM, XGBOOST and Arima in time series forecasting, in Proceedings of the 2021 12th International Conference on Information, Intelligence, Systems & Applications, IISA, 12-14 July 2021, Chania Crete, Greece (2021) doi:10.1109/IISA52424.2021.9555520 [Google Scholar]
  21. D. Akgun, Tensorflow based deep learning layer for local derivative patterns, Software Impacts, 14, 100452 (2022) doi: 10.1016/j.simpa.2022.100452 [CrossRef] [Google Scholar]
  22. D. Pekaslan, C. Wagner, J. M. Garibaldi, Adonis—Adaptive Online nonsingleton fuzzy logic systems, IEEE Transactions on Fuzzy Systems, 28, 2302-2312 (2020) doi: 10.1109/TFUZZ.2019.2933787 [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.