Zobrazeno 1 - 10
of 2 318
pro vyhledávání: '"A. A. Lisitsa"'
Autor:
A. A. Lisitsa
Publikováno v:
Вестник университета, Vol 0, Iss 6, Pp 62-74 (2024)
The article analyzes the organizational and economic mechanism of customs services infrastructure development on the example of the Far Eastern Federal District. The purpose of the study is to assess spatial and territorial location of customs and ne
Externí odkaz:
https://doaj.org/article/e9dcae5da7e7446e81efe6c012fb9900
Autor:
A. A. Lisitsa
Publikováno v:
Вестник университета, Vol 0, Iss 12, Pp 114-124 (2024)
The article analyzes scientific approaches to the definition of the terms “infrastructure”, “customs infrastructure”, “infrastructure in the field of customs services”, including in the context of functional aspects. The study purpose is
Externí odkaz:
https://doaj.org/article/2b98327ec8424fcba95d6d3e01c56d29
Autor:
A. A. Lisitsa
Publikováno v:
Управление, Vol 11, Iss 1, Pp 40-50 (2023)
Most of the strategic directions for improving customs administration in the Russian Federation, due to their specifics, involve interaction with the customs authorities of foreign states. The article discusses approaches to assessing the effectivene
Externí odkaz:
https://doaj.org/article/9a862ac6f0d04b44810c3a76a3554a2d
Publikováno v:
EPTCS 390, 2023, pp. 33-49
Writing temporal logic formulae for properties that combine instantaneous events with overlapping temporal phenomena of some duration is difficult in classical temporal logics. To address this issue, in previous work we introduced a new temporal logi
Externí odkaz:
http://arxiv.org/abs/2310.00997
Autor:
Zhong, Yinzheng, Lisitsa, Alexei
In this paper, we introduce the transition-based feature generator (TFGen) technique, which reads general activity data with attributes and generates step-by-step generated data. The activity data may consist of network activity from packets, system
Externí odkaz:
http://arxiv.org/abs/2308.10893
Data encryption limits the power and efficiency of queries. Direct processing of encrypted data should ideally be possible to avoid the need for data decryption, processing, and re-encryption. It is vital to keep the data searchable and sortable. Tha
Externí odkaz:
http://arxiv.org/abs/2209.15103
Autor:
Zhong, Yinzheng, Lisitsa, Alexei
In this paper, we consider the naive applications of process mining in network traffic comprehension, traffic anomaly detection, and intrusion detection. We standardise the procedure of transforming packet data into an event log. We mine multiple pro
Externí odkaz:
http://arxiv.org/abs/2206.10379
In this paper, we consider the applications of process mining in intrusion detection. We propose a novel process mining inspired algorithm to be used to preprocess data in intrusion detection systems (IDS). The algorithm is designed to process the ne
Externí odkaz:
http://arxiv.org/abs/2205.12064
Publikováno v:
In Soil Dynamics and Earthquake Engineering December 2024 187
Autor:
Khmeleva, Svetlana A., Suprun, Elena V., Vasileva, Yuliana A., Ptitsyn, Konstantin G., Kurbatov, Leonid K., Shershov, Valeriy E., Kuznetsova, Viktoriya E., Chudinov, Alexander V., Radko, Sergey P., Lisitsa, Andrey V.
Publikováno v:
In Microchemical Journal December 2024 207