Open Access
SHS Web Conf.
Volume 93, 2021
3rd International Scientific Conference on New Industrialization and Digitalization (NID 2020)
Article Number 02014
Number of page(s) 10
Section Financial and Legal Mechanisms (Instruments) of Industrialization and Digitalization
Published online 12 January 2021
  1. S. von Solms, Science and Information Conference, London, 335 (2013) [Google Scholar]
  2. Nyikes Zoltan, Rajn Zoltan, IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY), 217 (2015) [CrossRef] [Google Scholar]
  3. W. Hurst, M. Merabti, P. Fergus, 28th International Conference on Advanced Information Networking and Applications Workshops, 916 (2014) [Google Scholar]
  4. S. Giovinazzi, M. Pollino, A. Tofani, A. Di Pietro, L.L. Porta, V. Rosato, AEIT International Annual Conference (AEIT), 1 (2019) [Google Scholar]
  5. N. Bakalos et al., IEEE Signal Processing Magazine, 36(2), 36 (2019) [CrossRef] [Google Scholar]
  6. M.H.A. Klaver, H.A.M. Luiijf, A.H. Nieuwenhuijs, F. Cavenne, A. Ulisse, G. Bridegeman, First International Conference on Infrastructure Systems and Services: Building Networks for a Brighter Future (INFRA), 1 (2008) [Google Scholar]
  7. Neeta Pramod Ghadge, 2nd International Conference on Computing for Sustainable Global Development (INDIACom), 291 (2015) [Google Scholar]
  8. Zhaofeng Ma, Jianqing Huang, Ming Jiang, Chinese J. of Electronics, 481 (2016) [Google Scholar]
  9. L. Slipachuk, S. Toliupa, V. Nakonechnyi, 3rd International Conference on Advanced Information and Communications Technologies (AICT), 451 (2019) [Google Scholar]
  10. S. Toliupa, I. Parkhomenko, H. Shvedova, 3rd International Conference on Advanced Information and Communications Technologies (AICT), 463 (2019) [Google Scholar]
  11. I.F. Mikhalevich, V.A. Trapeznikov, Systems of Signals Generating and Processing in the Field of on Board Communications, 1 (2019) [Google Scholar]
  12. G.P. Gavdan, V.G. Ivanenko, A.A. Salkutsan, Security of information technologies, 26(4), 69 (2019) [Google Scholar]
  13. S.J. League, Proceedings 13th Annual Computer Security Applications Conference, 118 (1997) [CrossRef] [Google Scholar]
  14. M.V. Smekalova, Moscow University Bulletin, 25(1), 47 (2019) [Google Scholar]
  15. Britains cyber security strategy, [Google Scholar]
  16. Center for the Protection of National Infrastructure, [Google Scholar]
  17. R.I. Dremlyuga, S.S. Zotov, V.Yu. Pavlinskaya, Asia-Pacific Region: Economics, Politics, Law, 21(2), 130 (2019) [Google Scholar]
  18. I.A. Grachkov, A.A. Malyuk, Information technology security = IT Security, 26(1), 56 (2019) [Google Scholar]
  19. A.S. Shaburov, A.S. Nikitin, Bulletin of the Perm National Research Polytechnic University, 29, 104 (2019) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.