Results 21 to 30 of about 157,938 (303)

Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks

open access: yesData
Recent cyber security solutions for wireless networks during internet open access have become critically important for personal data security. The newest WPA3 network security protocol has been used to maximize this protection; however, attackers can use
Roman Banakh   +4 more
doaj   +1 more source

Consciousness Manipulation and Media Terrorismas Components of Threats to Democratization of Society and National Security

open access: yesІнтегровані комунікації, 2021
The article is devoted to the study of the role of the information component in the hybrid war against Ukraine. Problems of information security and protection of the national information space from negative manipulative and psychological influences are ...
Oleg Barna
doaj   +1 more source

INFORMATION SECURITY AS A COMPONENT OF THE NATIONAL SECURITY OF UKRAINE

open access: yesВісник Харківського національного університету імені В. Н. Каразіна: Серія "Питання політології", 2017
Mladonova O.
doaj   +1 more source

OVERLOAD AND TRAFFIC MANAGEMENT OF MESSAGE SOURCES WITH DIFFERENT PRIORITY OF SERVICE

open access: yesInformatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 2023
The scheme of dynamic management of traffic and activity of message sources with different priority of service is considered. The scheme is built on the basis of the neuroprognostic analysis model and the gradient descent method.
Valerii Kozlovskyi   +4 more
doaj   +1 more source

Prospects and current status of defence information security in Ukraine

open access: yesLinguistics and Culture Review, 2021
Relevance of the article - security has always been one of the priority issues of state policy, and considering the fact that the defense forces are an inseparable part of state security, the study of their information security is essential. The feasibility of this study is confirmed by the fact that in the current conditions of development of the ...
Olha O. Zolotar   +4 more
openaire   +3 more sources

Питання інформаційної безпеки України на сучасному етапі [PDF]

open access: yes, 2015
Voytsihovskyi, A.V. (2015), “The matter of information security of Ukraine at the present stage” [“Pytannia informatsiinoi bezpeky Ukrainy na suchasnomu etapi”], Pravo i Bezpeka, No. 3, pp. 15–20.Войціховський, А. В.
ORCID: http://orcid.org/0000-0001-5629-8852   +2 more
core  

Strategic Eurasian Natural Gas Model for Energy Security [PDF]

open access: yes, 2011
The mathematical formulation of a large-scale equilibrium natural gas simulation model is presented. Although large-scale natural gas models have been developed and used for energy security and policy analysis quite extensively (e.g., Holz (2007), Egging
Chyong, Chi Kong, Hobbs, Benjamin F.
core   +2 more sources

Beyond the Ban—Shedding Light on Smallholders' Price Vulnerability in Indonesia's Palm Oil Industry

open access: yesApplied Economic Perspectives and Policy, EarlyView.
ABSTRACT The Indonesian government imposed a palm oil export ban in April 2022 to address rising cooking oil prices. This study explores oil palm smallholders' vulnerability to the policy using descriptive statistics, Lasso, and post‐Lasso OLS regressions.
Charlotte‐Elena Reich   +3 more
wiley   +1 more source

Information security of the personnel of the State Border Guard Service of Ukraine: problematic issues of normative and legal regulation

open access: yesLaw and Safety
The article analyses the current legislation of Ukraine which provides for normative and legal regulation of public relations in the information sphere of activity of security and defence forces, in particular, the State Border Guard Service of Ukraine ...
V. V. Polovnikov
doaj   +1 more source

Modern quantum technologies of information security against cyber‐terrorist attacks

open access: yesAviation, 2010
In this paper, the systematisation and classification of modern quantum technologies of information security against cyber‐terrorist attack are carried out.
Oleksandr Korchenko   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy