Results 31 to 40 of about 122 (105)

The bases of development of systems of control and protection information from internal threats

open access: yesRUDN Journal of Informatization in Education, 2013
The present article is devoted to the analysis of information security in the conditions of high-growth hi-tech means of information processing and information security development of systems from internal threats.
V E Zhuzhzhalov   +3 more
doaj  

Роль технико-технологической безопасности в системе экономической безопасности организации

open access: yesИсследование проблем экономики и финансов, 2023
Введение. Технико-технологическая безопасность имеет важное место в системе экономической безопасности организации. Она является одной из составляющих компонентов общей безопасности и направлена на обеспечение безопасности технических и технологических ...
Людмила Александровна Уточкина
doaj  

SOFTWARE TOOLS FOR MODELING of physical processes in the protection of the speech information

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
A version of software for the simulation of physical processes in the protection of the speech information in the Java language in the software package Eclipse is shown.
I. V. Savchenko
doaj  

Scientific Reports from the 16‐th Scientific Conference of the Bulgarian Focal Point

open access: yes
Food Risk Assess Europe, Volume 4, Issue 1, January 2026.
wiley   +1 more source

AIR BUBBLE PANEL FOR INFORMATION PROTECTION FROM LEAKAGE VIA TECHNICAL CHANNELS

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
The description of the design and characteristics of the low weight and size combined air bubble panel for information protection from a leakage via acoustic, electromagnetic and optical technical channels are considered. Values of speech intelligibility
O. B. Zelmanski   +2 more
doaj  

TENDENCIES OF AUTOMATED CONTROL SYSTEMS DEVELOPMENT

open access: yesСовременная наука и инновации, 2022
Questions of new information technologies using in development and deployment of automation systems at the enterprises and business processes are considered.
Valery Abramovich Krishtal
doaj  

Batch Symmetric Fully Homomorphic Encryption Using Matrix Polynomials

open access: yesТруды Института системного программирования РАН, 2018
Fully homomorphic encryption (FHE) is a recognized tool to obtain the cryptographic protec-tion of cloud computing. However, the characteristics of existing FHE schemes are not suffi-cient for use in practice the security of some FHE is unsatisfying ...
Ph. Burtyka
doaj   +1 more source

SHIELDING AND MASKING PROPERTIES OF THE METAMATERIAL AS SCREENS

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
One of the significant channels of information leakage can be radio emission of information source. Channel protection against leakage of information can be provided by shielding the source of information, or by ensuring the secrecy of the object ...
S. F. Ali
doaj  

DEtermination of the energy criterion for evaluating information security against leakage channel side electromagnetic radiation

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
The use of noise generators for the protection and information leakage channels stray electromagnetic radiation in some cases, is the best and only option. When designing security systems usually requires an assessment of information security. The way to
M. V. Zhalkousky
doaj  

Home - About - Disclaimer - Privacy