default search action
Alexandr S. Basan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Elena Basan, Alexander S. Basan, Alexey S. Mushenko, Alexey Nekrasov, Colin J. Fidge, Alexander Lesnikov:
Analysis of Attack Intensity on Autonomous Mobile Robots. Robotics 13(7): 101 (2024) - 2023
- [j4]Elena Basan, Alexandr S. Basan, Alexey Nekrasov, Colin J. Fidge, Evgeniya Ishchukova, Anatoly Basyuk, Alexandr Lesnikov:
Trusted Operation of Cyber-Physical Processes Based on Assessment of the System's State and Operating Mode. Sensors 23(4): 1996 (2023) - 2021
- [j3]Elena Basan, Alexandr S. Basan, Alexey Nekrasov, Colin J. Fidge, Ján Gamec, Mária Gamcová:
A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes. Sensors 21(2): 509 (2021) - [j2]Ján Gamec, Elena Basan, Alexandr S. Basan, Alexey Nekrasov, Colin J. Fidge, Nikita Sushkin:
An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes. Sensors 21(18): 6116 (2021)
2010 – 2019
- 2019
- [j1]Elena Basan, Alexandr S. Basan, Alexey Nekrasov:
Method for Detecting Abnormal Activity in a Group of Mobile Robots. Sensors 19(18): 4007 (2019) - [c10]Elena Basan, Alexander S. Basan, Oleg B. Makarevich:
Detection of Anomalies in the Robotic System Based on the Calculation of Kullback-Leibler Divergence. CyberC 2019: 337-340 - [c9]Alexander S. Basan, Elena Basan, Anton Gritsyni:
Overview of Information Security Issues for a Robotic System. ICCT 2019: 1275-1279 - 2018
- [c8]Elena Basan, Alexander S. Basan, Oleg B. Makarevich:
Evaluating and Detecting Internal Attacks in a Mobile Robotic Network. CyberC 2018 - [c7]Elena Basan, Oleg B. Makarevich, Alexandr S. Basan:
Development of the Anomaly Detection Method for a Group of Mobile Robots. SIN 2018: 20:1-20:4 - 2017
- [c6]Alexander S. Basan, Elena Basan, Oleg B. Makarevich:
A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks. CyberC 2017: 369-372 - [c5]Alexander S. Basan, Elena Basan, Oleg B. Makarevich:
Analysis of ways to secure group control for autonomous mobile robots. SIN 2017: 134-139 - 2016
- [c4]Alexander S. Basan, Elena Basan, Oleg B. Makarevich:
Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust. CyberC 2016: 409-412 - [c3]Alexandr S. Basan, Elena Basan, Oleg B. Makarevich:
Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network. SIN 2016: 116-122 - 2013
- [c2]Ludmila K. Babenko, Alexandr S. Basan, Oleg B. Makarevich:
Performance analysis of the developed mandatory access control system in the DBMS. SIN 2013: 396-399
2000 – 2009
- 2009
- [c1]Alexandr S. Basan, Lyudmila K. Babenko, Oleg B. Makarevich:
A model of mandatory access for current database management systems. SIN 2009: 67-70
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint