Search

Your search keyword '"information protection system"' showing total 23 results

Search Constraints

Start Over You searched for: Descriptor "information protection system" Remove constraint Descriptor: "information protection system"
23 results on '"information protection system"'

Search Results

1. Development of the Theoretical Approach Based on Matrix Theory for Analyzing the State of Information Security Systems

3. An experimental methodology for assessing the probability and danger of network attacks in automated systems

4. DEVELOPMENT OF A METHOD FOR CALCULATION OF INFORMATION PROTECTION FROM THE CLUSTERING COEFFICIENT AND INFORMATION FLOW IN SOCIAL NETWORKS.

5. МОДЕЛІ І МЕТОДИ ЗАХИСТУ ІНФОРМАЦІЇ В КІБЕРФІЗІЧНИХ СИСТЕМАХ.

6. Optimization of Technical Information Protection System’s Composition

7. COMPUTER SCIENCE, COMPUTER ENGINEERING AND MANAGEMENT METHODICAL APPROACH TO EVALUATING THE PROBABILISTIC TIME PERFORMANCE INDICATOR OF AUTOMATED ADMINISTRATOR OPERATIONS IN INFORMATION PROTECTION SYSTEMS

8. MODEL OF THE PROCESS OF FUNCTIONING OF THE INFORMATION PROTECTION SYSTEM FROM UNAUTHORIZED ACCESS CREATED IN THE SOFTWARE ENVIRONMENT OF IMITATION MODELING 'CPN TOOLS'

9. PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM

10. FUNCTIONAL PERFORMANCE INDICATORS DURING SYSTEMS DEVELOPMENT TO PROTECT INFORMATION FROM UNAUTHORISED ACCESS

11. Development of a method for calculation of information protection from the clustering coefficient and information flow in social networks

12. Using preventive measures for the purpose of assuring information security of wireless communication channels

13. МОДЕЛІ І МЕТОДИ ЗАХИСТУ ІНФОРМАЦІЇ В КІБЕРФІЗІЧНИХ СИСТЕМАХ

14. SELECTION OF INFORMATION PROTECTION SYSTEM BY ENSURING THE COMPETITIVENESS OF ENTERPRISES

15. Розробка методу розрахунку захисту інформації від коефіцієнта кластеризації та потоку інформації у соціальних мережах

16. Information security of data channels based on a multifunctional tailored software and hardware solution.

17. СПЕЦИФІКА ТЕХНІЧНОГО ЗАХИСТУ ІНФОРМАЦІЇ: БЕЗПЕКОЗНАВЧІ КОНТЕКСТИ

18. Целевая адаптация систем защиты информации

19. Target adaptation of information protection systems

20. FUNCTIONAL PERFORMANCE INDICATORS DURING SYSTEMS DEVELOPMENT TO PROTECT INFORMATION FROM UNAUTHORISED ACCESS

21. Нарушения информационной безопасности в информационных системах с учетом распознавания объектов воздействий системами защиты информации в условиях неполноты априорных сведений

22. Using preventive measures for the purpose of assuring information security of wireless communication channels

23. A dynamic access control scheme based upon the knapsack problem

Catalog

Books, media, physical & digital resources