Results 91 to 100 of about 13,332,800 (308)

Problems of information security of economic entities

open access: yesУченые записки Российской академии предпринимательства
The article examines the problems of ensuring security in the process of processing, storing and transmitting information in modern economic conditions.
O. B. Repkina
doaj   +1 more source

Maximizing Sharing of Protected Information

open access: yesJournal of Computer and System Sciences, 2002
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
S. Dawson   +3 more
openaire   +3 more sources

Management of information protection based on the integrated implementation of decision support systems

open access: yes, 2017
We developed the method and the model for managing protection of objects of informatization, based on the integrated implementation of decision support systems for the tasks on cybersecurity.
V. Lakhno   +4 more
semanticscholar   +1 more source

Keratin 19 as a prognostic marker and contributing factor of metastasis and chemoresistance in high‐grade serous ovarian cancer

open access: yesMolecular Oncology, EarlyView.
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch   +13 more
wiley   +1 more source

Protecting Personal Information

open access: yesDalhousie Journal of Interdisciplinary Management, 2010
This paper looks at Nova Scotia's Personal Information International Disclosure Protection Act (PIIDPA), a piece of legislation that was specifically designed to protect Nova Scotia's citizens from having their personal information accessed by foreign governments.
openaire   +2 more sources

METHODS FOR PROTECTING SPEECH INFORMATION [PDF]

open access: yesPrikladnaya diskretnaya matematika, 2008
Summary: Telephone conversations are the major channel of information interaction. The requirements for maintenance of speech confidentiality and for protecting information having the speech nature are growing. In the paper some problems arising in connection with the speech information protection are considered, and some ways for solving them are ...
openaire   +2 more sources

A Study of Student Nurses' Knowledge and Awareness about Patients' Personal Information Protection

open access: yes, 2016
This study examined the nursing student's preliminary knowledge and awareness of patient's personal information protection. 187 respondents, who were trained in 2 different nursing colleges in Kyungpook province, participated in the survey from May 18 to
Yu-Cheol Bae, Soyun Lee
semanticscholar   +1 more source

Somatic mutational landscape in von Hippel–Lindau familial hemangioblastoma

open access: yesMolecular Oncology, EarlyView.
The causes of central nervous system (CNS) hemangioblastoma in Von Hippel–Lindau (vHL) disease are unclear. We used Whole Exome Sequencing (WES) on familial hemangioblastoma to investigate events that underlie tumor development. Our findings suggest that VHL loss creates a permissive environment for tumor formation, while additional alterations ...
Maja Dembic   +5 more
wiley   +1 more source

The Provision of Physical Protection of Information During the Transmission of Commands to a Group of UAVs Using Fiber Optic Communication Within the Group

open access: yesDrones
This paper presents a novel method for the precise localization of remote radio-signal sources using a formation of unmanned aerial vehicles (UAVs). The approach is based on time-difference-of-arrival (TDoA) measurements and the geometric analysis of ...
Dina Shaltykova   +3 more
doaj   +1 more source

STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2018
An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.
Anna Romanova, Sergiy Toliupa
doaj   +1 more source

Home - About - Disclaimer - Privacy