Results 21 to 30 of about 4,412,712 (309)
Time Protection: the Missing OS Abstraction [PDF]
Timing channels enable data leakage that threatens the security of computer systems, from cloud platforms to smartphones and browsers executing untrusted third-party code.
Acıiçmez Onur +22 more
core +2 more sources
The digital economy includes a variety of economic processes carried out using information technology. Digital transformation processes, including those associated with the fourth industrial revolution, open up new paradigms for the use of information ...
Arslan G. Mustafaev / Арслан Г. Мустафаев +2 more
doaj +1 more source
Information flows in the world are growing very quickly. The exchange of information is growing rapidly. In connection with this fact, the existing mathematical apparatus and its practical application are constantly developing.
Volodymyr Khoroshko +3 more
doaj +1 more source
Models of interaction of cryptography and chaotic dynamics
Cryptography deals with the problem of information protection by its transformation, providing the protection of information (by means of computational techniques), i.e. a set of agreed encryptian tools.
B.K. Shayakhmetova +3 more
doaj +1 more source
Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side [PDF]
The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side.
Buriachok, Volodymyr +7 more
core
The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of the research is to consider the main methods and algorithms for identifying an individual by ...
Vasyl Trysnyuk +4 more
doaj +1 more source
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data.
Volodymyr Korchynskyi +5 more
doaj +1 more source
Analysis and protection of IoT systems: Edge computing and decentralized decision-making
This article presents a detailed analysis of the Internet of Things (IoT) systems and the methods used to protect them. The article highlights the potential of edge computing to minimize traffic transmission and the decentralization of decision-making ...
Nadiia M. Lobanchykova +2 more
doaj +1 more source
Model for cryptography protection of confidential information [PDF]
УДК 004.056 Борсуковський Ю.В., Борсуковська В.Ю. Модель криптографічного захисту конфіденційної інформації В даній статті проведено детальний аналіз вимог щодо формування моделі криптографічного захисту конфіденційної інформації.
Борсуковська, Вікторія Юріївна +1 more
core
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie +4 more
wiley +1 more source

