?
Applying Time Series for Background User Identification Based on Their Text Data Analysis
Programming and Computer Software. 2018. Vol. 44. No. 5. P. 353-362.
Petrovskiy M., Korolev V., Korchagin A., Mashechkin I., Tsarev D.
Berlin : Springer, 2013
This volume contains the papers selected for presentation at the 18th European Symposium on Research in Computer Security (ESORICS 2013), held during September 9–13, 2013, in Egham, UK. In response to the symposium’s call for papers, 242 papers were submitted to the conference from 38 countries. These papers were evaluated on the basis of their ...
Added: March 24, 2015
Artem S. Kabanov, Yury I. Gudkov, Vladimir N. Azarov, , in : Proceedings of the 2019 IEEE International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS). : IEEE, 2019. P. 132-135.
The article deals with the problems of ensuring functional, informational and cyber security for vehicles and transport infrastructure facilities. The analysis of the factors causing the growth of threats to the transport sector has been carried out, the list of typical cyber attacks on the components of the transport infrastructure is given. The results of ...
Added: December 18, 2019
Stanislav Pozdniakov, Musabirov I., Anastasiya Kuznetsova, , in : Digital Transformation & Global Society: Second International Conference, DTGS 2017, St. Petersburg, Russia, June 21-23, 2017, Revised Selected Papers. : Springer, 2017. P. 113-119.
In this paper, we analyse the strategies and stratification of Russian universities in the Northwestern region. By enriching traditional social network analysis scientometric tools, we developed web presence indicators focused on the contexts in which universities are linked with businesses and are mentioned in media. We treat resulting groups in terms of Gouldner’s cosmopolitans versus ...
Added: December 11, 2017
Goncharov Dmitry, Nechai Valerii, , in : Digital Transformation and Global Society. Second International Conference, DTGS 2017, St. Petersburg, Russia, June 21–23, 2017, Revised Selected Papers. : Cham : Springer, 2017. P. 270-281.
This article explores the map of political preferences of Russian Twitter users in the wake of March 2017 anti-corruption protests. So far there is little research on the political aspects of Twitter in Russia and our paper seeks to fill this gap in the scholarship. It is based on content analysis of over 45,000 tweets ...
Added: March 8, 2018
Goncharov D. V., Nechai V., Полития: Анализ. Хроника. Прогноз 2018 № 1 С. 65-81
Хотя по числу пользователей Твиттер заметно уступает другим действующим в нашей стране социальным сетям (прежде всего таким, как ВКонтакте и Facebook), его общественная и политическая значимость довольно велика, что обусловлено как техническими особенностями этой сети, так и спецификой общественной и политической коммуникации в современной России. На фоне жесткого государственного контроля над ключевыми медиа Твиттер представляет ...
Added: March 8, 2018
Nagornyy O. S., , in : Digital Transformation and Global Society Third International Conference, DTGS 2018, St. Petersburg, Russia, May 30 –June 2, 2018, Revised Selected Papers, Part I. Issue 858.: Cham : Springer, 2018. Ch. . P. 83-94.
The paper reveals the topic structure of ethnic discussions in the Russian-speaking social media and explores how these topics are related to the post-Soviet ethnic groups. Analyzed more than 2.6 million texts from Russian-speak- ing social media published for two-year period from 2014 to 2015 and contained at least one of the post-Soviet ethnonyms, we ...
Added: September 3, 2018
Prokofyeva E. S., Zaitsev R., Maltseva S. V., , in : 2019 IEEE 21st Conference on Business Informatics (CBI). Vol. 1.: M. : IEEE Computer Society, 2019. P. 75-83.
Patient flow modeling in healthcare plays a large role in understanding the operation of the system and its characteristics. Besides, modeling techniques can significantly improve the effectiveness of the medical facilities. The existing level of automation in these facilities enables the accumulation of large amounts of various data. Therefore, the collected data might be considered ...
Added: September 10, 2019
Nagornyy O. S., Мониторинг общественного мнения: Экономические и социальные перемены 2017 № 4 С. 165-184
The paper presents the results of a study based on the Big Data paradigm analysis. The study aims at defining the features of the ethnic discourse in the Russian-speaking social media and the place of the North Caucasus ethnicities in this discourse. The informational basis for the study is 2,659,849 social media publications containing ethnonyms. ...
Added: August 21, 2017
Koltsova O., Scherbak A. N., New Media and Society 2015 Vol. 17 No. 10 P. 1715-1732
This study explores relationship between the Internet and the Russian national election of 2011-2012. In contrast to other studies, we focus on the blogosphere as a political factor. Our conclusions are based on a study of the LiveJournal blogging platform represented by a sample of political posts from the top 2000 bloggers for 13 week-long ...
Added: April 30, 2014
SciTePress, 2021
The International Conference on Information Systems Security and Privacy provides a meeting point for researchers and practitioners, addressing the security and privacy challenges of information systems from both technological and social perspectives. The conference welcomes papers of either practical or theoretical nature, and is interested in research or applications addressing all aspects of security and privacy, ...
Added: October 18, 2021
Sherstinova T., Митрофанова О. А., Скребцова Т. Г. et al., , in : Advances in Computational Intelligence: 19th Mexican International Conference on Artificial Intelligence, MICAI 2020. Part II. Vol. 12469.: Springer, 2020. P. 134-151.
The paper presents an experiment aimed at comparison of results of topic modelling via non-negative matrix factorization (NMF) with that of manual topic annotation performed by an expert. The experiment was conducted on the annotated corpus of Russian short stories of the initial three decades of the 20th century, which contains 310 stories with a ...
Added: November 1, 2020
Shirokanova A., Silyutina O., , in : WebSci'18 Proceedings of the 10th ACM Conference on Web Science. : NY : ACM, 2018. P. 359-363.
Russia first introduced Internet regulation in 2012 with site blockings and then progressed to personal data retention and ban on VPNs. This makes an interesting case because online media had spread and established a parallel political agenda in Russia in the 2000s, before the onset of regulations. The focus of this study is the contents ...
Added: June 1, 2018
Romanenko A., Springer Proceedings in Mathematics & Statistics 2015 P. 137-146
The paper deals with applying the strong aggregating algorithm to games with asymmetric loss function. A particular example of
such games is the problem of time series forecasting where specific losses
from under-forecasting and over-forecasting may vary considerably. We
use the aggregating algorithm for building compositions of adaptive forecasting algorithms. The paper specifies sufficient conditions under which
a composition ...
Added: December 6, 2018
Switzerland : Springer, 2020
This book constitutes the joint refereed proceedings of the 20th International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networks and Systems, NEW2AN 2020, and the 13th Conference on Internet of Things and Smart Spaces, ruSMART 2020. The conference was held virtually due to the COVID-19 pandemic.
The 79 revised full papers presented were carefully reviewed ...
Added: December 23, 2020
Mäkitalo N., Ometov A., Kannisto J. et al., IEEE Software 2018 Vol. 35 No. 1 P. 30-37
System design where cyber-physical applications are securely coordinated from the cloud may simplify the development process. However, all private data are then pushed to these remote “swamps,” and human users lose actual control as compared to when the applications are executed directly on their devices. At the same time, computing at the network edge is ...
Added: March 13, 2018
Koltsova O., Pashakhin S., / National Research University Higher School of Economics. Series WP BRP "Basic research program". 2017. No. 79/SOC/2017.
Although conflict representation in media has been widely studied, few attempts have been made to perform large-scale comparisons of agendas in the media of conflicting parties, especially for armed country-level confrontations. In this paper, we introduce quantitative evidence of agenda divergence between the media of conflicting parties in the course of the Ukrainian crisis 2013-2014. ...
Added: December 29, 2017
Urquiza A. A., Kirigin T. B., Kanovich M. et al., Netherlands : IOS Press, 2021
The Journal of Computer Security presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems. It also provides a forum for ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community.
The journal provides an opportunity to ...
Added: October 18, 2021
IEEE, 2019
Denial of Service (DoS) attacks have been a serious security concern, as no service is, in principle, protected against them. Although a Dolev-Yao intruder with unlimited resources can trivially render any service unavailable, DoS attacks do not necessarily have to be carried out by such (extremely) powerful intruders. It is useful in practice and more ...
Added: November 1, 2019
Urquiza A. A., AlTurki M. A., Kirigin T. B. et al., , in : Journal of Computer Security. Vol. 25. Issue 6.: Amsterdam : IOS Press, 2017. Ch. 29(3). P. 299-340.
Added: October 18, 2021
Romashkova I., Komarov M. M., Ometov A., IEEE Access 2021 No. 9 P. 129264-129277
One of the most promising enablers for the secure distributed operation of the Internet of Things (IoT) systems could be based on a mathematical construct widely known as blockchain that aims to neglect the system’s centralization and scalability properties. This paper aims to map the requirements and features of both systems, highlight the main co-existence ...
Added: September 26, 2021
Sizykh N., Orshanskaya E., Sizykh D., , in : 2022 15th International Conference Management of large-scale system development (MLSD). : M. : IEEE, 2022. P. 1-6.
The paper presents the research results of the predictive ability of stock quote forecasting models using the ARIMA/LSTM hybrid model. This study is based on a predictive power analysis using a sample of 30 companies from three sectors: energy, finance, and technology. ...
Added: November 14, 2022
Danilov K., Maltseva S. V., , in : 2021 IEEE 23rd Conference on Business Informatics. : IEEE, 2021.
Added: June 13, 2022
Abramyan T., Юрист 2018 № 5 С. 68-72
The article analyzes the issues of legal regulation concerning liability for offences in the field of information technology (cybercrime). Author outlines the main issues of regulation in the field of information technology, examines current approaches of Russian lawyers and expressed her own proposals to resolve issues in the designated area. ...
Added: June 17, 2018
Bufalo M., Orlando G., Tourism Review 2024 Vol. 79 No. 2 P. 445-464
This study aims to predict overnight stays in Italy at tourist accommodation facilities through a nonlinear, single factor, stochastic model called CIR#. The contribution of this study is twofold: in terms of forecast accuracy and in terms of parsimony (both from the perspective of the data and the complexity of the modeling), especially when a ...
Added: February 16, 2024