Results 31 to 40 of about 13,332,800 (308)

Speaker Anonymization for Personal Information Protection Using Voice Conversion Techniques

open access: yesIEEE Access, 2020
As speech-based user interfaces integrated in the devices such as AI speakers become ubiquitous, a large amount of user voice data is being collected to enhance the accuracy of speech recognition systems.
In-Chul Yoo   +5 more
semanticscholar   +1 more source

Development of Approaches and Schemes for Proactive Information Protection in Computer Networks

open access: yes2022 International Conference on Information Science and Communications Technologies (ICISCT), 2020
This paper proposes approaches to protecting information from the standpoint of the paradigm of their proactive security and a method for proactively protecting information from malicious code based on expert assessments.
M. Karimov   +2 more
semanticscholar   +1 more source

Method of blocking access to information and telecommunication systems based on biometric identification/authentication of users

open access: yesТехнічна інженерія, 2020
It is established that the security of information and telecommunication systems depends significantly on the high level of efficiency of the access control and data protection systems.
O.S. Boichenko   +3 more
doaj   +1 more source

Digital Transformation of the Economy: Threats to Infor-mation Security / Цифровая трансформация экономики: угрозы информационной безопасности

open access: yesBeneficium, 2021
The digital economy includes a variety of economic processes carried out using information technology. Digital transformation processes, including those associated with the fourth industrial revolution, open up new paradigms for the use of information ...
Arslan G. Mustafaev / Арслан Г. Мустафаев   +2 more
doaj   +1 more source

Mathematical apparatus for finding the optimal configuration secure communication network with a specified number of subscribers

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
Information flows in the world are growing very quickly. The exchange of information is growing rapidly. In connection with this fact, the existing mathematical apparatus and its practical application are constantly developing.
Volodymyr Khoroshko   +3 more
doaj   +1 more source

Models of interaction of cryptography and chaotic dynamics

open access: yesҚарағанды университетінің хабаршысы. Математика сериясы, 2019
Cryptography deals with the problem of information protection by its transformation, providing the protection of information (by means of computational techniques), i.e. a set of agreed encryptian tools.
B.K. Shayakhmetova   +3 more
doaj   +1 more source

INFORMATION PROTECTION AND DATA EXCHANGE SECURITY IN WIRELESS MOBILE NETWORKS WITH AUTHENTICATION AND KEY EXCHANGE PROTOCOLS

open access: yesCybersecurity: Education, Science, Technique
The mobility of users, signal transmission through open cyberspace, and the need for low energy consumption in mobile devices lead to numerous new challenges related to information protection in wireless mobile networks.
Yuliia Kostiuk   +6 more
semanticscholar   +1 more source

A METHOD FOR USER AUTHENTICATING TO CRITICAL INFRASTRUCTURE OBJECTS BASED ON VOICE MESSAGE IDENTIFICATION

open access: yesСучасні інформаційні системи, 2020
The subject of the research is the protection of critical infrastructure objects from unauthorized access based on voice message identification. The purpose of the research is to consider the main methods and algorithms for identifying an individual by ...
Vasyl Trysnyuk   +4 more
doaj   +1 more source

Method of information protection based on the integration of probabilistic encryption and noise immune coding

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The subject matter of this article is the processes of increasing information security in communication systems to solve applied problems that are critical in the transmission of confidential data.
Volodymyr Korchynskyi   +5 more
doaj   +1 more source

Analysis and protection of IoT systems: Edge computing and decentralized decision-making

open access: yesJournal of Edge Computing, 2022
This article presents a detailed analysis of the Internet of Things (IoT) systems and the methods used to protect them. The article highlights the potential of edge computing to minimize traffic transmission and the decentralization of decision-making ...
Nadiia M. Lobanchykova   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy