Results 91 to 100 of about 13,332,800 (308)
Problems of information security of economic entities
The article examines the problems of ensuring security in the process of processing, storing and transmitting information in modern economic conditions.
O. B. Repkina
doaj +1 more source
Maximizing Sharing of Protected Information
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
S. Dawson +3 more
openaire +3 more sources
We developed the method and the model for managing protection of objects of informatization, based on the integrated implementation of decision support systems for the tasks on cybersecurity.
V. Lakhno +4 more
semanticscholar +1 more source
Keratin 19 (KRT19) is overexpressed in high‐grade serous ovarian cancer with high levels of Kallikrein‐related peptidases (KLK) 4–7 and is associated with poor survival. In vivo analyses demonstrate that elevated KRT19 increases peritoneal tumour burden.
Sophia Bielesch +13 more
wiley +1 more source
Protecting Personal Information
This paper looks at Nova Scotia's Personal Information International Disclosure Protection Act (PIIDPA), a piece of legislation that was specifically designed to protect Nova Scotia's citizens from having their personal information accessed by foreign governments.
openaire +2 more sources
METHODS FOR PROTECTING SPEECH INFORMATION [PDF]
Summary: Telephone conversations are the major channel of information interaction. The requirements for maintenance of speech confidentiality and for protecting information having the speech nature are growing. In the paper some problems arising in connection with the speech information protection are considered, and some ways for solving them are ...
openaire +2 more sources
A Study of Student Nurses' Knowledge and Awareness about Patients' Personal Information Protection
This study examined the nursing student's preliminary knowledge and awareness of patient's personal information protection. 187 respondents, who were trained in 2 different nursing colleges in Kyungpook province, participated in the survey from May 18 to
Yu-Cheol Bae, Soyun Lee
semanticscholar +1 more source
Somatic mutational landscape in von Hippel–Lindau familial hemangioblastoma
The causes of central nervous system (CNS) hemangioblastoma in Von Hippel–Lindau (vHL) disease are unclear. We used Whole Exome Sequencing (WES) on familial hemangioblastoma to investigate events that underlie tumor development. Our findings suggest that VHL loss creates a permissive environment for tumor formation, while additional alterations ...
Maja Dembic +5 more
wiley +1 more source
This paper presents a novel method for the precise localization of remote radio-signal sources using a formation of unmanned aerial vehicles (UAVs). The approach is based on time-difference-of-arrival (TDoA) measurements and the geometric analysis of ...
Dina Shaltykova +3 more
doaj +1 more source
STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS
An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.
Anna Romanova, Sergiy Toliupa
doaj +1 more source

