Vladimir S. Zaborovsky

Orcid: 0000-0003-2284-9833

According to our database1, Vladimir S. Zaborovsky authored at least 27 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
GBMILs: Gradient Boosting Models for Multiple Instance Learning.
Proceedings of the Interactive Collaborative Robotics - 8th International Conference, 2023

2021
Uncertainty Interpretation of the Machine Learning Survival Model Predictions.
IEEE Access, 2021

2019
Research on the pixel-based and object-oriented methods of urban feature extraction with GF-2 remote-sensing images.
CoRR, 2019

Database Acquisition for the Lung Cancer Computer Aided Diagnostic Systems.
Proceedings of the 25th Conference of Open Innovations Association, 2019

2018
The Method of Modelling Wireless Network Using Telematics Maps.
Proceedings of the 23rd Conference of Open Innovations Association, 2018

2017
Siamese neural network for intelligent information security control in multi-robot systems.
Autom. Control. Comput. Sci., 2017

Algorithms for planning Resource-Intensive computing tasks in a hybrid supercomputer environment for simulating the characteristics of a quantum rotation sensor and performing engineering calculations.
Autom. Control. Comput. Sci., 2017

Communication Technologies in the Space Experiment "Kontur-2".
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017

Space experiment "Kontur-2": Applied methods and obtained results.
Proceedings of the 21st Conference of Open Innovations Association, 2017

2015
Preemptive queueing system with randomized push-out mechanism.
Commun. Nonlinear Sci. Numer. Simul., 2015

Corrigendum to "Preemptive queueing system with randomized push-out mechanism" [Commun Nonlinear Sci Numer Simulat 21 (2015) 147-158].
Commun. Nonlinear Sci. Numer. Simul., 2015

Model of hidden IT security threats in the cloud computing environment.
Autom. Control. Comput. Sci., 2015

Method of security against computer attacks based on an analysis of executable machine code.
Autom. Control. Comput. Sci., 2015

Cyber-Physical Approach in a Series of Space Experiments "Kontur".
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015

2014
Cyber-Physical Approach to the Network-Centric Robot Control Problems.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2014

Distributed Packet Trace Processing Method for Information Security Analysis.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2014

2013
Adage mobile services for ITS infrastructure.
Proceedings of the 13th International Conference on ITS Telecommunications, 2013

Heterogeneous Multiprotocol Vehicle Controls Systems in Cloud Computing Environment.
Proceedings of the ICINCO 2013 - Proceedings of the 10th International Conference on Informatics in Control, Automation and Robotics, Volume 1, Reykjavík, Iceland, 29, 2013

2011
Dynamic access control in cloud services.
Proceedings of the IEEE International Conference on Systems, 2011

Access Isolation Mechanism based on Virtual Connection Management in Cloud Systems - How to Secure Cloud System using High Perfomance Virtual Firewalls.
Proceedings of the ICEIS 2011, 2011

2010
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation.
Proceedings of the 2010 International Conference on Security & Management, 2010

Firewall Configuration based on Specifications of Access Policy and Network Environment.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
TCP Flows in Stochastic Network Environment: Models and Characteristics.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2007
Network Traffic Invariant Characteristics: Metering Aspects.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

Network Complexity: Cross-Layer Models and Characteristics.
Proceedings of the Third Advanced International Conference on Telecommunications (AICT 2007), 2007

2005
Architecture of Distributed Network Processors: Specifics of Application in Information Security Systems.
Proceedings of the Networking, 2005


  Loading...