Results 31 to 40 of about 122 (105)
The bases of development of systems of control and protection information from internal threats
The present article is devoted to the analysis of information security in the conditions of high-growth hi-tech means of information processing and information security development of systems from internal threats.
V E Zhuzhzhalov +3 more
doaj
[Interaction between the gut microbiota and oral antihyperglycemic drugs]. [PDF]
Buyvalenko UV, Pokrovskaya EV.
europepmc +1 more source
Роль технико-технологической безопасности в системе экономической безопасности организации
Введение. Технико-технологическая безопасность имеет важное место в системе экономической безопасности организации. Она является одной из составляющих компонентов общей безопасности и направлена на обеспечение безопасности технических и технологических ...
Людмила Александровна Уточкина
doaj
SOFTWARE TOOLS FOR MODELING of physical processes in the protection of the speech information
A version of software for the simulation of physical processes in the protection of the speech information in the Java language in the software package Eclipse is shown.
I. V. Savchenko
doaj
Scientific Reports from the 16‐th Scientific Conference of the Bulgarian Focal Point
Food Risk Assess Europe, Volume 4, Issue 1, January 2026.
wiley +1 more source
AIR BUBBLE PANEL FOR INFORMATION PROTECTION FROM LEAKAGE VIA TECHNICAL CHANNELS
The description of the design and characteristics of the low weight and size combined air bubble panel for information protection from a leakage via acoustic, electromagnetic and optical technical channels are considered. Values of speech intelligibility
O. B. Zelmanski +2 more
doaj
TENDENCIES OF AUTOMATED CONTROL SYSTEMS DEVELOPMENT
Questions of new information technologies using in development and deployment of automation systems at the enterprises and business processes are considered.
Valery Abramovich Krishtal
doaj
Batch Symmetric Fully Homomorphic Encryption Using Matrix Polynomials
Fully homomorphic encryption (FHE) is a recognized tool to obtain the cryptographic protec-tion of cloud computing. However, the characteristics of existing FHE schemes are not suffi-cient for use in practice the security of some FHE is unsatisfying ...
Ph. Burtyka
doaj +1 more source
SHIELDING AND MASKING PROPERTIES OF THE METAMATERIAL AS SCREENS
One of the significant channels of information leakage can be radio emission of information source. Channel protection against leakage of information can be provided by shielding the source of information, or by ensuring the secrecy of the object ...
S. F. Ali
doaj
The use of noise generators for the protection and information leakage channels stray electromagnetic radiation in some cases, is the best and only option. When designing security systems usually requires an assessment of information security. The way to
M. V. Zhalkousky
doaj

