Results 21 to 30 of about 4,412,712 (309)

Time Protection: the Missing OS Abstraction [PDF]

open access: yes, 2018
Timing channels enable data leakage that threatens the security of computer systems, from cloud platforms to smartphones and browsers executing untrusted third-party code.
Acıiçmez Onur   +22 more
core   +2 more sources

Digital Transformation of the Economy: Threats to Infor-mation Security / Цифровая трансформация экономики: угрозы информационной безопасности

open access: yesBeneficium, 2021
The digital economy includes a variety of economic processes carried out using information technology. Digital transformation processes, including those associated with the fourth industrial revolution, open up new paradigms for the use of information ...
Arslan G. Mustafaev / Арслан Г. Мустафаев   +2 more
doaj   +1 more source

Mathematical apparatus for finding the optimal configuration secure communication network with a specified number of subscribers

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
Information flows in the world are growing very quickly. The exchange of information is growing rapidly. In connection with this fact, the existing mathematical apparatus and its practical application are constantly developing.
Volodymyr Khoroshko   +3 more
doaj   +1 more source

Models of interaction of cryptography and chaotic dynamics

open access: yesҚарағанды университетінің хабаршысы. Математика сериясы, 2019
Cryptography deals with the problem of information protection by its transformation, providing the protection of information (by means of computational techniques), i.e. a set of agreed encryptian tools.
B.K. Shayakhmetova   +3 more
doaj   +1 more source

Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side [PDF]

open access: yes, 2020
The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side.
Buriachok, Volodymyr   +7 more
core  

A METHOD FOR USER AUTHENTICATING TO CRITICAL INFRASTRUCTURE OBJECTS BASED ON VOICE MESSAGE IDENTIFICATION

open access: yesСучасні інформаційні системи, 2020
The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of the research is to consider the main methods and algorithms for identifying an individual by ...
Vasyl Trysnyuk   +4 more
doaj   +1 more source

Method of information protection based on the integration of probabilistic encryption and noise immune coding

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data.
Volodymyr Korchynskyi   +5 more
doaj   +1 more source

Analysis and protection of IoT systems: Edge computing and decentralized decision-making

open access: yesJournal of Edge Computing, 2022
This article presents a detailed analysis of the Internet of Things (IoT) systems and the methods used to protect them. The article highlights the potential of edge computing to minimize traffic transmission and the decentralization of decision-making ...
Nadiia M. Lobanchykova   +2 more
doaj   +1 more source

Model for cryptography protection of confidential information [PDF]

open access: yes, 2018
УДК 004.056 Борсуковський Ю.В., Борсуковська В.Ю. Модель криптографічного захисту конфіденційної інформації В даній статті проведено детальний аналіз вимог щодо формування моделі криптографічного захисту конфіденційної інформації.
Борсуковська, Вікторія Юріївна   +1 more
core  

Why and When Are Evidence‐Based Interventions Adopted in Paediatric Supportive Care? A Qualitative Exploration of the Determinants of Photobiomodulation Implementation

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Oral mucositis is a common and debilitating side effect of childhood cancer and stem cell transplant treatments. It affects the quality of life of children and young people (CYP) and places a strain on services. Photobiomodulation is recommended for oral mucositis prevention in international guidance but is poorly implemented in UK ...
Claudia Heggie   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy