default search action
Alexander Uskov
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Igor E. Protsenko, Alexander V. Uskov:
Quantum Fluctuations in the Small Fabry-Perot Interferometer. Symmetry 15(2): 346 (2023)
2010 – 2019
- 2016
- [j5]Adam Byerly, Alexander Uskov:
A New Method of Exploring a Range of Genetic Parameters During the Execution of a Genetic Algorithm. Int. J. Comput. Sci. Appl. 13(2): 16-28 (2016) - [j4]Alexander Uskov, Adam Byerly, Colleen Heinemann:
Advanced Encryption Standard Analysis with Multimedia Data on Intel® AES-NI Architecture. Int. J. Comput. Sci. Appl. 13(2): 89-105 (2016) - [j3]Adam Byerly, Alexander Uskov:
A novel approach to avoiding early stagnation in Ant Colony Optimization algorithms. Int. J. Knowl. Based Intell. Eng. Syst. 20(2): 113-121 (2016) - [j2]Alexander Uskov, Nataliya Serdyukova, Vladimir I. Serdyukov, Colleen Heinemann, Adam Byerly:
Multi objective optimization of VPN design by linear programming with risks models. Int. J. Knowl. Based Intell. Eng. Syst. 20(3): 175-188 (2016) - [c14]Adam Byerly, Alexander Uskov:
A new parameter adaptation method for Genetic Algorithms and Ant Colony Optimization algorithms. EIT 2016: 668-673 - [c13]Colleen Heinemann, Sai Shankar Chaduvu, Adam Byerly, Alexander Uskov:
OpenCL and CUDA software implementations of encryption/decryption algorithms for IPsec VPNs. EIT 2016: 765-770 - [c12]Alexander V. Uskov, Natalia A. Serdyukova, Vladimir I. Serdyukov, Adam Byerly, Colleen Heinemann:
Optimal Design of IPsec-Based Mobile Virtual Private Networks for Secure Transfer of Multimedia Data. IIMSS 2016: 51-62 - 2015
- [c11]Vinay Bhargav Vasudevamurt, Alexander Uskov:
Serious game engines: Analysis and applications. EIT 2015: 440-445 - 2014
- [j1]Alexander Uskov:
The Efficiency of Encryption Algorithms in EAX Moder of Operation in IPSEC-based Virtual Private Networks for Streaming Rich Multimedia Data. Int. J. Comput. Sci. Appl. 11(1): 18-36 (2014) - [c10]Alexander Uskov, Hayk Avagyan:
The efficiency of block ciphers in Galois/Counter Mode in IPsec-based virtual private networks. EIT 2014: 173-178 - [c9]Alexander Uskov, Bhuvana Sekar:
Serious games, gamification and game engines to support framework activities in engineering: Case studies, analysis, classifications and outcomes. EIT 2014: 618-623 - 2013
- [c8]Vladimir Uskov, Yun Wang, Alexander Uskov, Jiang-Bo Liu:
Engineering innovative Mobile Computing curriculum. EDUCON 2013: 560-565 - [c7]Alexander V. Uskov:
Software and Web applications security: state-of-the-art courseware and learning paradigm. EDUCON 2013: 608-611 - [c6]Alexander Uskov:
IPsec VPN-Based Security of Web-Based Rich Multimedia Systems. IIMSS 2013: 31-40 - [c5]Alexander Uskov:
Gamification in Computer Science. IIMSS 2013: 41-50 - 2012
- [c4]Alexander V. Uskov:
Computer gaming technology education: Advanced 3D laboratory and courseware. EIT 2012: 1-6 - [c3]Alexander V. Uskov:
Information security of mobile VPN: Conceptual models and design methodology. EIT 2012: 1-6 - [c2]Alexander V. Uskov:
Information Security of IPsec-based Mobile VPN: Authentication and Encryption Algorithms Performance. TrustCom 2012: 1042-1048
2000 – 2009
- 2004
- [c1]Vladimir Uskov, Alexander Uskov:
National Science Foundation Project on Advanced Online Education in Information Technology. ITCC (1) 2004: 682-686
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint