default search action
Vladimir S. Zaborovsky
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c19]Andrei V. Konstantinov, Lev V. Utkin, Vladimir Muliukha, Vladimir S. Zaborovsky:
GBMILs: Gradient Boosting Models for Multiple Instance Learning. ICR 2023: 233-245 - 2021
- [j7]Lev V. Utkin, Vladimir S. Zaborovsky, Maxim S. Kovalev, Andrei V. Konstantinov, Natalia A. Politaeva, Alexey Lukashin:
Uncertainty Interpretation of the Machine Learning Survival Model Predictions. IEEE Access 9: 120158-120175 (2021)
2010 – 2019
- 2019
- [c18]Anna A. Meldo, Lev V. Utkin, Alexey Lukashin, Vladimir Muliukha, Vladimir S. Zaborovsky:
Database Acquisition for the Lung Cancer Computer Aided Diagnostic Systems. FRUCT 2019: 220-227 - [i1]Dong-dong Zhang, Lei Zhang, Vladimir S. Zaborovsky, Feng Xie, Yanwen Wu, Ting-Ting Lu:
Research on the pixel-based and object-oriented methods of urban feature extraction with GF-2 remote-sensing images. CoRR abs/1903.03412 (2019) - 2018
- [c17]Maxim Sharagin, Sergey Popov, Vadim Glazunov, Vladimir S. Zaborovsky:
The Method of Modelling Wireless Network Using Telematics Maps. FRUCT 2018: 341-347 - 2017
- [j6]Alexander Ilyashenko, Alexey Lukashin, Vladimir S. Zaborovsky, An. A. Lukashin:
Algorithms for planning Resource-Intensive computing tasks in a hybrid supercomputer environment for simulating the characteristics of a quantum rotation sensor and performing engineering calculations. Autom. Control. Comput. Sci. 51(6): 426-434 (2017) - [j5]Lev V. Utkin, Vladimir S. Zaborovsky, Sergey G. Popov:
Siamese neural network for intelligent information security control in multi-robot systems. Autom. Control. Comput. Sci. 51(8): 881-887 (2017) - [c16]Vladimir Muliukha, Alexander Ilyashenko, Vladimir S. Zaborovsky, Andrey Novopasheniy:
Space experiment "Kontur-2": Applied methods and obtained results. FRUCT 2017: 244-253 - [c15]Vladimir Muliukha, Vladimir S. Zaborovsky, Alexander Ilyashenko, Yuri Podgurski:
Communication Technologies in the Space Experiment "Kontur-2". NEW2AN 2017: 587-597 - 2015
- [j4]V. Yu. Aranov, Vladimir S. Zaborovsky:
Method of security against computer attacks based on an analysis of executable machine code. Autom. Control. Comput. Sci. 49(8): 705-708 (2015) - [j3]A. S. Molyakov, Vladimir S. Zaborovsky, Alexey Lukashin:
Model of hidden IT security threats in the cloud computing environment. Autom. Control. Comput. Sci. 49(8): 741-744 (2015) - [j2]Vladimir Muliukha, Alexander Ilyashenko, Oleg Zayats, Vladimir S. Zaborovsky:
Preemptive queueing system with randomized push-out mechanism. Commun. Nonlinear Sci. Numer. Simul. 21(1-3): 147-158 (2015) - [j1]Vladimir Muliukha, Alexander Ilyashenko, Oleg Zayats, Vladimir S. Zaborovsky:
Corrigendum to "Preemptive queueing system with randomized push-out mechanism" [Commun Nonlinear Sci Numer Simulat 21 (2015) 147-158]. Commun. Nonlinear Sci. Numer. Simul. 28(Issues): 27 (2015) - [c14]Vladimir S. Zaborovsky, Vladimir Muliukha, Alexander Ilyashenko:
Cyber-Physical Approach in a Series of Space Experiments "Kontur". NEW2AN 2015: 745-758 - 2014
- [c13]Alexey Lukashin, Leonid Laboshin, Vladimir S. Zaborovsky, Vladimir Mulukha:
Distributed Packet Trace Processing Method for Information Security Analysis. NEW2AN 2014: 535-543 - [c12]Vladimir S. Zaborovsky, Mikhail Guk, Vladimir Muliukha, Alexander Ilyashenko:
Cyber-Physical Approach to the Network-Centric Robot Control Problems. NEW2AN 2014: 619-629 - 2013
- [c11]Vladimir S. Zaborovsky, Mikhail Chuvatov, Oleg Yu. Gusikhin, Abdulaziz Makkiya, David Hatton:
Heterogeneous Multiprotocol Vehicle Controls Systems in Cloud Computing Environment. ICINCO (1) 2013: 555-561 - [c10]Vladimir S. Zaborovsky, Alexey Lukashin, Sergey G. Popov, Alexey V. Vostrov:
Adage mobile services for ITS infrastructure. ITST 2013: 127-132 - 2011
- [c9]Alexey Lukashin, Vladimir S. Zaborovsky, Sergey Kupreenko:
Access Isolation Mechanism based on Virtual Connection Management in Cloud Systems - How to Secure Cloud System using High Perfomance Virtual Firewalls. ICEIS (3) 2011: 371-375 - [c8]Vladimir S. Zaborovsky, Alexey Lukashin, Sergey Kupreenko, Vladimir Mulukha:
Dynamic access control in cloud services. SMC 2011: 1400-1404 - 2010
- [c7]Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey Kouprienko, Oleg Zayats:
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation. Security and Management 2010: 30-35 - [c6]Anton Titov, Vladimir S. Zaborovsky:
Firewall Configuration based on Specifications of Access Policy and Network Environment. Security and Management 2010: 146-151
2000 – 2009
- 2009
- [c5]Vladimir S. Zaborovsky, Anton Titov:
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy. Security and Management 2009: 603-608 - [e1]Robert Bestak, Laurent George, Vladimir S. Zaborovsky, Cosmin Dini:
The Eighth International Conference on Networks, ICN 2009, 1-6 March 2009, Gosier, Guadeloupe, France. IEEE Computer Society 2009, ISBN 978-0-7695-3552-4 [contents] - 2008
- [c4]Vladimir S. Zaborovsky, Sergey Ygorov, Nikolay Fedorov:
TCP Flows in Stochastic Network Environment: Models and Characteristics. ICN 2008: 491-496 - 2007
- [c3]Vladimir S. Zaborovsky, Alexsander Gorodetsky, Andrey Lapin:
Network Complexity: Cross-Layer Models and Characteristics. AICT 2007: 16 - [c2]Vladimir S. Zaborovsky, Andrey Rudskoy, Alex Sigalov:
Network Traffic Invariant Characteristics: Metering Aspects. ICN 2007: 55 - 2005
- [c1]Vladimir S. Zaborovsky, Y. A. Shemanin, Andrey Rudskoy:
Architecture of Distributed Network Processors: Specifics of Application in Information Security Systems. ICN (2) 2005: 681-688
Coauthor Index
aka: Vladimir Muliukha
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint