Search

Showing total 322 results

Search Constraints

Start Over You searched for: Language english Remove constraint Language: english Language russian Remove constraint Language: russian Journal безопасность информационных технологии Remove constraint Journal: безопасность информационных технологии
322 results

Search Results

1. Ensuring technological independence by creating the necessary reserves of the electronic component base as one of the elements of its power of attorney

2. Sustainability of technological processes in the aspect of security of critical information infrastructure

3. Exploration of the use of temporary computer system resources by anti-virus tools

4. Systematics of concepts in the field of information security

5. Research of authentication methods in the industrial internet of things

6. Cybersecurity of the network perimeter of the critical information infrastructure object

7. Analysis of changes in personal data legislation since September 1, 2022

8. Methods of image transformation for person authentication using face thermographic image

9. Investigating the possibility of increasing the resilience to attack of the differential energy watermarking embedding method

10. Hiding data in blocks of Oracle Database

11. Privacy-preserving machine learning based on secure four-party computations

12. An approach to evaluating the effectiveness of the information security system for a distributed data transmission system

13. Investigation of threats to the functioning of cyber-physical systems due to the use of vulnerabilities of the wireless standard IEEE 802.11

14. An Analysis of Local Security Authority Subsystem Services for Windows and Linux

15. Method for analysis of the stability of nuclear power plant systems to the impact of computer attacks

16. Privacy-preserving machine learning based on secure two-party computations

17. Conceptual scheme (paradigm) of connected data technologies

18. Improving the training of specialists to ensure the security of the information infrastructure of the internal affairs authorities

19. Topical issues of the problem of assessment of threats of cyber attacks on information resources of significant facilities of critical information infrastructure

20. Using a virtual laboratory environment for penetration-testing skills training

21. Ensuring the security of state information systems in conditions of uncertainty

22. Application of machine vision technology for focused laser effect accuracy improvement in microelectronic structures research and semiconductor microprocessing

23. Technological platform for the implementation of the cybersecurity network concept ('Cybersecurity Mesh')

24. Measurement of criteria parameters of analog-to-digital converters and monitoring of their changes during the radiation experiment

25. Information security of state information systems

26. Approach to steganography storage in removable media file system

27. Models and algorithms of privacy-preserving machine learning

28. Terms and definitions base development for counterfeit electronics test for critical information infrastructure objects

29. Distributed ledger as a tool to ensure trust among business process participants

30. Cold multi-currency wallet on the platform MKT

31. Development of algorithm for assessment risk of cyber attacks in electronic banking

32. On the cryptographic properties of 'Limonnik-3' AKE scheme

33. Implementation of A Static Images Protection Method in 'Quantum World'

34. Development and use of national information resources as the basis for digital economy development

35. Analysis of current regulations in the field of cybersecurity of critical information infrastructure of the Russian Federation

36. Study of the applicability of the hierarchy analysis method for choosing a SIEM system

37. Approach to assessing the danger of destructive effects of malware on special-purpose automated systems

38. Search for malicious powershell scripts using syntax trees

39. LMQSAS - post-quantum aggregate signature scheme with lazy verification

40. Cryptographic scheme for group passwords distribution in steganographic systems

41. About the possibility of embedding the distributed ledger technologies into the systems of mixed workflow

42. The digital economy and actual problems of the improvement of the training system in the field of information security

43. Development and implementation of a method to detect an abnormal behavior of nodes in a group of robots

44. Building secure multidimensional data management system

45. Fundamentals of scientific research for information security specialists: on the approach to the textbook

46. A secure mutual authentication procedure, generate the key fiscal basis, and fiscal data protection

47. New method of steganalysis for text data obtained by synonym run-length encoding

48. To the issue about the purpose and objectives the USA National initiative for cybersecurity education

49. Robustness Analysis of Dynamic Watermarks

50. The Use of Speech Technology to Protect the Document Turnover