Results 31 to 40 of about 141 (124)
[Interaction between the gut microbiota and oral antihyperglycemic drugs]. [PDF]
Buyvalenko UV, Pokrovskaya EV.
europepmc +1 more source
The bases of development of systems of control and protection information from internal threats
The present article is devoted to the analysis of information security in the conditions of high-growth hi-tech means of information processing and information security development of systems from internal threats.
V E Zhuzhzhalov +3 more
doaj
Роль технико-технологической безопасности в системе экономической безопасности организации
Введение. Технико-технологическая безопасность имеет важное место в системе экономической безопасности организации. Она является одной из составляющих компонентов общей безопасности и направлена на обеспечение безопасности технических и технологических ...
Людмила Александровна Уточкина
doaj
SOFTWARE TOOLS FOR MODELING of physical processes in the protection of the speech information
A version of software for the simulation of physical processes in the protection of the speech information in the Java language in the software package Eclipse is shown.
I. V. Savchenko
doaj
AIR BUBBLE PANEL FOR INFORMATION PROTECTION FROM LEAKAGE VIA TECHNICAL CHANNELS
The description of the design and characteristics of the low weight and size combined air bubble panel for information protection from a leakage via acoustic, electromagnetic and optical technical channels are considered. Values of speech intelligibility
O. B. Zelmanski +2 more
doaj
TENDENCIES OF AUTOMATED CONTROL SYSTEMS DEVELOPMENT
Questions of new information technologies using in development and deployment of automation systems at the enterprises and business processes are considered.
Valery Abramovich Krishtal
doaj
Batch Symmetric Fully Homomorphic Encryption Using Matrix Polynomials
Fully homomorphic encryption (FHE) is a recognized tool to obtain the cryptographic protec-tion of cloud computing. However, the characteristics of existing FHE schemes are not suffi-cient for use in practice the security of some FHE is unsatisfying ...
Ph. Burtyka
doaj +1 more source
SHIELDING AND MASKING PROPERTIES OF THE METAMATERIAL AS SCREENS
One of the significant channels of information leakage can be radio emission of information source. Channel protection against leakage of information can be provided by shielding the source of information, or by ensuring the secrecy of the object ...
S. F. Ali
doaj
In article principles of selection of the maintenance of training of students of high schools to technologies of protection of the information in conditions fundamentalization of education are discussed.
V V Grinshkun, E D Dimov
doaj
AUTHENTIFICATION USER TOOLS IN CORPORATIVE INFORMATION SYSTEMS AND CLOUD COMPUTING AREAS
Analysis elements of users work in information corporative systems (ICS) are done. The mathematical model of social authentification in ICS allows on given quality of unsatisfactory marks to calculate the probability of successful authentification with ...
U. A. Vishniakou, M. M. Gongag Sas
doaj

