Results 231 to 240 of about 130,608 (266)
Some of the next articles are maybe not open access.
The Problem of Selecting APCS’ Information Security Tools
2019This article discusses the problem of selecting information security tools for one of the varieties of cyber-physical systems—automated process control systems. The study of several classes of solutions was conducted, considering their application in automated systems.
Andrew S. Rimsha, Konstantin S. Rimsha
openaire +1 more source
Information security as utilization tool of enterprise information capital
2011In developed countries, especially in large enterprises and public sectors, information capital as a separate capital form within structural capital is preserved by technical measures aimed towards negating or mitigating risks imposed upon controlled set of information assets.
Tijan, Edvard +2 more
openaire +1 more source
THE FEATURES OF INFORMATION SECURITY TOOLS CENTRALIZED CONTROL
Intelligent transport systemsThis article examines the indicators that are used to assess the state of information security in an organization. Modern problems related to the centralized management of information security tools were also identified. Based on these problems, the requirements for the Information Security Management Center were determined, as well as the functions ...
S.E. Ikonnikov +2 more
openaire +1 more source
Security Policy Verification Tool for Geographical Information Systems
2007It is universally recognized, that one of the most effective approaches to security management consists in the use of policy-based security systems. This approach assumes that all actions of the system under defense are performed according to a policy incorporating a multitude of if-else rules describing the system behavior.
Igor Kotenko +3 more
openaire +1 more source
LSB as a Steganography Tool in Information Security
5TH INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND COMPUTER SCIENCE (CIC-COCOS'24)Least Significant Bit (LSB) method was used to encrypt and decrypt text in images to improve secret communication. An extensive investigation of the use, experimentation, and assessment of a hidden writing strategies to better understand how concealed communication promotes protected interaction and addresses ongoing difficulties.
Zainab Abdulhameed Alher +2 more
openaire +1 more source
Sputnik as a tool for securing geodetic information
Journal of the Franklin Institute, 1958Abstract A simplified picture is employed for utilizing Sputnik tracking data (perigee, apogee, period, maximum and minimum orbital velocity) in the determination of the Earth's mass and radius. For this purpose, basic characteristics of the motion are conveniently re-expressed in terms of the perigee and apogee parameters.
openaire +1 more source
THE TOOLS OF INFORMATION SUPPORT OF REGIONAL SECURITY MANAGEMENT
История науки и техники, 2019В статье рассматриваются вопросы организации информационной поддержки обеспечения риск-устойчивого регионального развития. Авторы приводят научно-практические результаты своей деятельности, направленной на создание информационных технологий управления региональной безопасностью. Детально рассматриваются полимодельный комплекс, информационная технология
openaire +1 more source
2020
In this paper, the methods of information protection in bio systems are studied. The paper considers the use of intelligent tools in information security systems and the use of adaptive information security systems. Several articles on the field of information protection in bio systems are analyzed.
openaire +1 more source
In this paper, the methods of information protection in bio systems are studied. The paper considers the use of intelligent tools in information security systems and the use of adaptive information security systems. Several articles on the field of information protection in bio systems are analyzed.
openaire +1 more source
Cancer epigenetics in clinical practice
Ca-A Cancer Journal for Clinicians, 2023Veronica Davalos, Manel Esteller
exaly
An Optimal Set Of Information Security Tools
European Proceedings of Social and Behavioural Sciences, 2021openaire +1 more source

