Search

Your search keyword '"Information theory"' showing total 1,174 results

Search Constraints

Start Over You searched for: Descriptor "Information theory" Remove constraint Descriptor: "Information theory" Journal безопасность информационных технологии Remove constraint Journal: безопасность информационных технологии
1,174 results on '"Information theory"'

Search Results

1. Access control model in ICS

2. Some aspects of IC radiation hardness evaluation to the effects of high-energy ions

3. Improving non-compliant information security behavior using algorithms

4. On the possibility of improving the procedures for quantifying information protection of critical information infrastructure objects from threats of unauthorized access

5. Recommendations for creating a trust infrastructure in the interests of the digital ruble system

6. Stochastic methods of information security

7. Methodology for assessing the accuracy of determining the spatial characteristics of local navigation systems

8. Ensuring the security of objects in the information sphere

9. EDITOR-IN-CHIEF'S COLUMN

10. TECHNOLOGICAL SAFETY

11. Application of machine learning methods for preventive identification of deviant groups of adolescents

15. The Design Technique for Power Management Unit of the Tag IC for Radio Frequency Identification of Critical Infrastructure Objects

16. The methodology of analysis and assessment of the level of security of the software used at the objects of informatization of internal affairs bodies

17. Neural network device for recognizing speech commands based on hardware accelerators of the NEUROMATRIX family

18. A formalized representation of the target function of the impact of malicious software on the operating environment of a special-purpose automated control system

20. ENSURING SAFETY WHILE ENHANCING PERFORMANCE: ENCOURAGING REINFORCEMENT LEARNING BY ADDRESSING CONSTRAINTS AND UNCERTAINTY

21. Substantiation of the indicator for assessing the manageability of information security in automated control systems of critical applications from the effects of malicious software

22. Algorithm obtaining invariants

23. Problems of floating vulnerabilities in ensuring mobile application security

24. The methodology of functional modeling as a tool for formalizing the process of intercepting computer information through spurious electromagnetic radiation and interference

25. Configurable ring oscillator with controlled interconnections

26. Development of recommendations for reducing the energy of the signal emitted by the LVDS interface

28. EDITOR-IN-CHIEF'S COLUMN

31. Managing wireless communication security for smart home cyber-physical systems

32. Improving the training of specialists to ensure the security of the information infrastructure of the internal affairs authorities

33. Analysis of the prospects for using fitness bracelets as a source of biometric information when synthesizing the biosignature of an important document

34. The quality assurance system of the trusted Microelectronic production

35. Ensuring the privacy of information in distributed ledger systems with zero-knowledge proofs

36. Models and approaches to attack surface analysis for fuzz testing of the Linux kernel

39. The creation of domestic software repositories is a priority task to ensure the technological independence of critical information infrastructure

40. Exploring feature set for building a digital user profile of remote connections (based on firewall data)

41. The choice of the way to counteract leakage of information due to side electromagnetic radiation

42. Cybersecurity concepts’ taxonomy

47. Alexander Yu. Nikiforov

48. The possibility of improving procedures for quantitative threat assessment of unauthorized access to information of critical information infrastructure facilities

49. Application of machine vision technology for focused laser effect accuracy improvement in microelectronic structures research and semiconductor microprocessing

50. Alexander Yu. Nikiforov

Catalog

Books, media, physical & digital resources