Search

Your search keyword '"lcsh:Information theory"' showing total 858 results

Search Constraints

Start Over You searched for: Descriptor "lcsh:Information theory" Remove constraint Descriptor: "lcsh:Information theory" Publisher moscow engineering physics institute Remove constraint Publisher: moscow engineering physics institute
858 results on '"lcsh:Information theory"'

Search Results

1. Universal triple encoding for compression and protecting binary data

2. Simulation of the dynamics of network attacks in automated systems of internal affairs bodies in the 'CPN Tools' software environment

3. Features of information security of computer systems

4. Assessing the resilience of critical information infrastructures to information security threats

5. Using a virtual laboratory environment for penetration-testing skills training

6. Ensuring the security of state information systems in conditions of uncertainty

7. Analysis vulnerabilities of user authentication process using Active Directory

8. The distributed ledgers ensuring privacy-preserving transactions

9. Measurement of criteria parameters of analog-to-digital converters and monitoring of their changes during the radiation experiment

10. The use of microelectronics radiation behavior asphysical uncloned function to find counterfeit

11. The influence of high ionizing dose rate on CMOS IC radiation hardness used in da-ta transmission elements

12. The knowledge graph concept of decision support system in preliminary investigation

13. Evaluating CMOS chip sensitivity parameters to single event upsets under influence of neutrons by the burst generation rate function

14. The methodology for critical processes identifying at information infrastructure facilities

15. Approaches to online handwritten signature verification

16. Integrity monitoring of virtual machines components based on the KVM hypervisor

17. Development of secure architectures for process control systems

18. Terms and definitions base development for counterfeit electronics test for critical information infrastructure objects

19. Models and algorithms of privacy-preserving machine learning

20. Speech-like signal system modeling and its application in the field of security, communication and control access

21. Algorithm for creation of automated systems in protected performance

22. Distributed ledger as a tool to ensure trust among business process participants

23. The Okinawa Charter and the Congress of the United Nations: cybercrime countering issues

24. To the problem of assessing and ensuring the correctness of business processes

25. Features of advanced training of specialists in ensuring safety of significant objects of critical information infrastructure

26. The concept of decision support system in preliminary investigation

27. Counterfeit electronic components identifying methods in terms of industrial cyber security

28. On the cryptographic properties of 'Limonnik-3' AKE scheme

29. Implementation of A Static Images Protection Method in 'Quantum World'

30. To the issue of categorization of critical informational infrastructure objects in higher education

31. Improving the visual information security by consistent application of methods for its processing and protection

32. Method for detection of network traffic anomalies which is based on its self-similar traffic structure

33. Improvement of image analysis/synthesis technologies of acoustic (speech) information for the control, safety and communication systems

34. Development problems of trusted software applied at critical information infrastructure objects (organizational and methodological aspects)

35. Issues of Practical Application of Blockchain Technology

36. About the possibility of embedding the distributed ledger technologies into the systems of mixed workflow

37. Educational and Laboratory System for Studying Man-in-the-Middle Attacks and Ways to Protect against Them

38. The digital economy and actual problems of the improvement of the training system in the field of information security

39. Distributed system of collecting, processing and analysis of security information events of the enterprise network infrastructure

40. Protection of external information perimeter of organization from spear phishing

41. Research of possibility of improvement of realization of algorithm of method of koch for embedding of digital watermarks in images

42. On the issue of the blockchain technology perspectives. The more things change, the more they stay the same

43. Fundamentals of scientific research for information security specialists: on the approach to the textbook

44. Authentication of electronics components for cyber-physical systems

45. Building secure multidimensional data management system

46. A secure mutual authentication procedure, generate the key fiscal basis, and fiscal data protection

47. The analysis of the training system for specialists working in the field of information security

48. Information security threats in web-portals on the open journal systems platform

49. To the issue about the purpose and objectives the USA National initiative for cybersecurity education

50. Use of generator substitution to determine the real attenuation of informative signals in the compromising emanation

Catalog

Books, media, physical & digital resources