Integrating RBAC, MIC, and MLS in Verified Hierarchical Security Model for Operating System P. N. DevyaninA. V. KhoroshilovI. V. Shchepetkov OriginalPaper 11 December 2020 Pages: 443 - 453
Occlusion Culling Algorithm Based on Software Visibility Checks V. I. Gonakhchyan OriginalPaper 11 December 2020 Pages: 454 - 462
Designing Interfaces for Classes of a Neural Network Graph Model Yu. L. KarpovI. A. VolkovaYu. G. Smetanin OriginalPaper 11 December 2020 Pages: 463 - 472
On the Possibility of Secure Program Obfuscation in Some Model of Cloud Computing A. V. ShokurovI. V. AbramovaV. A. Zakharov OriginalPaper 11 December 2020 Pages: 473 - 482