Results 21 to 30 of about 157,938 (303)
Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks
Recent cyber security solutions for wireless networks during internet open access have become critically important for personal data security. The newest WPA3 network security protocol has been used to maximize this protection; however, attackers can use
Roman Banakh +4 more
doaj +1 more source
The article is devoted to the study of the role of the information component in the hybrid war against Ukraine. Problems of information security and protection of the national information space from negative manipulative and psychological influences are ...
Oleg Barna
doaj +1 more source
INFORMATION SECURITY AS A COMPONENT OF THE NATIONAL SECURITY OF UKRAINE
Mladonova O.
doaj +1 more source
OVERLOAD AND TRAFFIC MANAGEMENT OF MESSAGE SOURCES WITH DIFFERENT PRIORITY OF SERVICE
The scheme of dynamic management of traffic and activity of message sources with different priority of service is considered. The scheme is built on the basis of the neuroprognostic analysis model and the gradient descent method.
Valerii Kozlovskyi +4 more
doaj +1 more source
Prospects and current status of defence information security in Ukraine
Relevance of the article - security has always been one of the priority issues of state policy, and considering the fact that the defense forces are an inseparable part of state security, the study of their information security is essential. The feasibility of this study is confirmed by the fact that in the current conditions of development of the ...
Olha O. Zolotar +4 more
openaire +3 more sources
Питання інформаційної безпеки України на сучасному етапі [PDF]
Voytsihovskyi, A.V. (2015), “The matter of information security of Ukraine at the present stage” [“Pytannia informatsiinoi bezpeky Ukrainy na suchasnomu etapi”], Pravo i Bezpeka, No. 3, pp. 15–20.Войціховський, А. В.
ORCID: http://orcid.org/0000-0001-5629-8852 +2 more
core
Strategic Eurasian Natural Gas Model for Energy Security [PDF]
The mathematical formulation of a large-scale equilibrium natural gas simulation model is presented. Although large-scale natural gas models have been developed and used for energy security and policy analysis quite extensively (e.g., Holz (2007), Egging
Chyong, Chi Kong, Hobbs, Benjamin F.
core +2 more sources
Beyond the Ban—Shedding Light on Smallholders' Price Vulnerability in Indonesia's Palm Oil Industry
ABSTRACT The Indonesian government imposed a palm oil export ban in April 2022 to address rising cooking oil prices. This study explores oil palm smallholders' vulnerability to the policy using descriptive statistics, Lasso, and post‐Lasso OLS regressions.
Charlotte‐Elena Reich +3 more
wiley +1 more source
The article analyses the current legislation of Ukraine which provides for normative and legal regulation of public relations in the information sphere of activity of security and defence forces, in particular, the State Border Guard Service of Ukraine ...
V. V. Polovnikov
doaj +1 more source
Modern quantum technologies of information security against cyber‐terrorist attacks
In this paper, the systematisation and classification of modern quantum technologies of information security against cyber‐terrorist attack are carried out.
Oleksandr Korchenko +2 more
doaj +1 more source

