Search

Your search keyword '"Information theory"' showing total 6,325 results

Search Constraints

Start Over You searched for: Descriptor "Information theory" Remove constraint Descriptor: "Information theory" Topic q350-390 Remove constraint Topic: q350-390
6,325 results on '"Information theory"'

Search Results

1. Access control model in ICS

2. Some aspects of IC radiation hardness evaluation to the effects of high-energy ions

3. Improving non-compliant information security behavior using algorithms

4. On the possibility of improving the procedures for quantifying information protection of critical information infrastructure objects from threats of unauthorized access

5. Recommendations for creating a trust infrastructure in the interests of the digital ruble system

6. Stochastic methods of information security

7. Methodology for assessing the accuracy of determining the spatial characteristics of local navigation systems

8. Ensuring the security of objects in the information sphere

9. EDITOR-IN-CHIEF'S COLUMN

10. TECHNOLOGICAL SAFETY

11. Application of machine learning methods for preventive identification of deviant groups of adolescents

15. The Design Technique for Power Management Unit of the Tag IC for Radio Frequency Identification of Critical Infrastructure Objects

16. The methodology of analysis and assessment of the level of security of the software used at the objects of informatization of internal affairs bodies

17. Neural network device for recognizing speech commands based on hardware accelerators of the NEUROMATRIX family

18. A formalized representation of the target function of the impact of malicious software on the operating environment of a special-purpose automated control system

20. ENSURING SAFETY WHILE ENHANCING PERFORMANCE: ENCOURAGING REINFORCEMENT LEARNING BY ADDRESSING CONSTRAINTS AND UNCERTAINTY

21. Substantiation of the indicator for assessing the manageability of information security in automated control systems of critical applications from the effects of malicious software

22. Algorithm obtaining invariants

23. Problems of floating vulnerabilities in ensuring mobile application security

24. The methodology of functional modeling as a tool for formalizing the process of intercepting computer information through spurious electromagnetic radiation and interference

25. Configurable ring oscillator with controlled interconnections

26. Development of recommendations for reducing the energy of the signal emitted by the LVDS interface

27. Fulfilling data access obligations: How could (and should) platforms facilitate data donation studies?

28. Privacy Paradox in Industry 4.0: A review of library information services and data protection

29. Emerging South African smart cities: Data security and privacy risks and challenges

30. Economic empowerment of women domestic workers: Role of digital financial services

31. Exploring the influences of virtual brand community members’ interaction on brand loyalty

32. Infrastructure as a service adoption model for South African universities using thematic analysis

33. A model on workarounds and information security integrity

34. Factors influencing data quality in routine health information systems in Maridi county, South Sudan

35. IoT appropriation for crop management and productivity enhancement in South Africa

36. Examining the applicability of the Protection of Personal Information Act in AI-driven environments

37. General-purpose AI regulation and the European Union AI Act

38. Unleashing the power of the 4IR in organisational value chains: A conceptual analysis

39. The current state of agile methodology utilisation in a South African insurance company

40. An investigation of healthcare professionals’ intention to use Smart Card Technology

41. Determining the digital divide among people with disabilities in KwaZulu-Natal

42. A digital procurement framework for South African public sector: A content analysis approach

43. Nominal ranking technique in information and knowledge management: A methodology to SoTL

44. Project leadership competencies influencing success in Information Communication Technology projects

45. Blocking the information war? Testing the effectiveness of the EU’s censorship of Russian state propaganda among the fringe communities of Western Europe

46. But did they really? Platforms’ compliance with the Code of Practice on Disinformation in review

47. Estonia’s digital diplomacy: Nordic interoperability and the challenges of cross-border e-governance

48. The European approach to regulating AI through technical standards

Catalog

Books, media, physical & digital resources