Performance analysis of trickles and TCP transport protocols under high-load network conditions MA Nikitinskiy, DJ Chalyy Automatic Control and Computer Sciences 47 (7), 359-365, 2013 | 20 | 2013 |
An extensible coloured Petri net model of a transport protocol for packet switched networks DJ Chaly, VA Sokolov International Conference on Parallel Computing Technologies, 66-75, 2003 | 11 | 2003 |
Decidability of boundedness problems for Minsky counter machines EV Kuzmin, DJ Chalyy Automatic Control and Computer Sciences 44 (7), 387-397, 2010 | 7 | 2010 |
A Simple Information Flow Security Model for Software-Defined Networks D Chalyy, E Nikitin, E Antoshina Proceedings of the 17th Conference of Open Innovations Association FRUCT …, 2015 | 6 | 2015 |
Automaton counter machines EV Kuzmin, VA Sokolov, DJ Chaly Proc. of Int. Workshop on Program Understanding (sat. of PSI’09), 1-4, 2009 | 6 | 2009 |
On some approaches to the solution of the problem «Useful Proof-of-work for blockchains» VG Durnev, DM Murin, VA Sokolov, DY Chalyi Modelirovanie i Analiz Informatsionnykh Sistem 25 (4), 402-410, 2018 | 5 | 2018 |
Design and security analysis of a fragment of Internet of Things telecommunication system VA Alexandrov, VA Desnitsky, DY Chaly Modelirovanie i Analiz Informacionnyh Sistem 23 (6), 767-776, 2016 | 5 | 2016 |
On Some Approaches to the Solution of the “Useful Proof-of-Work for Blockchains” Task VG Durnev, DM Murin, VA Sokolov, DJ Chalyy Automatic Control and Computer Sciences 52 (7), 880-884, 2018 | 4 | 2018 |
End-to-end information flow security model for software-defined networks DY Chalyi, ES Nikitin, EY Antoshina, VA Sokolov Моделирование и анализ информационных систем 22 (6), 735-749, 2015 | 4 | 2015 |
A translator with a security static analysis feature of an information flow for a simple programming language EJ Antoshina, AN Barakova, ES Nikitin, DJ Chalyy Automatic Control and Computer Sciences 48 (7), 589-593, 2014 | 4 | 2014 |
On the decidability of boundedness problems for counter Minsky machines EV Kuz'min, DY Chalyi Modelirovanie i Analiz Informatsionnykh Sistem 15 (1), 16-26, 2008 | 4 | 2008 |
On the reachability set of automaton counter machines EV Kuzmin, DJ Chalyy Automatic Control and Computer Sciences 45 (7), 444-451, 2011 | 3 | 2011 |
On a class of counter machines EV Kuz'min, DY Chalyi Modelirovanie i Analiz Informatsionnykh Sistem 16 (2), 75-82, 2009 | 3 | 2009 |
Building a Security Policy Tree for SDN Controllers1This work is partially supported by RFBR under the grants 17-07-00823-a and 16-07-01103a. S Morzhov, V Sokolov, M Nikitinskiv, D Chaly 2018 International Scientific and Technical Conference Modern Computer …, 2018 | 2 | 2018 |
Boundedness problems for Minsky counter machines EV Kuzmin, VA Sokolov, DY Chalyy Programming and Computer Software 36 (1), 3-10, 2010 | 1 | 2010 |
On a reachability set of automaton 3-counter machines EV Kuz'min, DY Chalyi Modelirovanie i Analiz Informatsionnykh Sistem 16 (3), 77-84, 2009 | 1 | 2009 |
Boundedness problems for Minsky counter machines EV Kuzmin, VA Sokolov, DY Chaly Doklady Mathematics 78 (1), 604-606, 2008 | 1 | 2008 |
The Boundedness Problems of Counter Minsky Machines EV Kuzmin, VA Sokolov, DY Chalyy Doklady Academii Nauk 421 (6), 741-743, 2008 | 1 | 2008 |
A Security System Event Log Analysis DJ Chalyy, NI Ovchenkov, EG Lazareva, RR Yaikov | 1* | |
Semantic Security Tools in Software-Defined Networks EJ Antoshina, DJ Chalyy Automatic Control and Computer Sciences 52 (7), 605-607, 2018 | | 2018 |