Results 231 to 240 of about 130,608 (266)
Some of the next articles are maybe not open access.

The Problem of Selecting APCS’ Information Security Tools

2019
This article discusses the problem of selecting information security tools for one of the varieties of cyber-physical systems—automated process control systems. The study of several classes of solutions was conducted, considering their application in automated systems.
Andrew S. Rimsha, Konstantin S. Rimsha
openaire   +1 more source

Information security as utilization tool of enterprise information capital

2011
In developed countries, especially in large enterprises and public sectors, information capital as a separate capital form within structural capital is preserved by technical measures aimed towards negating or mitigating risks imposed upon controlled set of information assets.
Tijan, Edvard   +2 more
openaire   +1 more source

THE FEATURES OF INFORMATION SECURITY TOOLS CENTRALIZED CONTROL

Intelligent transport systems
This article examines the indicators that are used to assess the state of information security in an organization. Modern problems related to the centralized management of information security tools were also identified. Based on these problems, the requirements for the Information Security Management Center were determined, as well as the functions ...
S.E. Ikonnikov   +2 more
openaire   +1 more source

Security Policy Verification Tool for Geographical Information Systems

2007
It is universally recognized, that one of the most effective approaches to security management consists in the use of policy-based security systems. This approach assumes that all actions of the system under defense are performed according to a policy incorporating a multitude of if-else rules describing the system behavior.
Igor Kotenko   +3 more
openaire   +1 more source

LSB as a Steganography Tool in Information Security

5TH INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND COMPUTER SCIENCE (CIC-COCOS'24)
Least Significant Bit (LSB) method was used to encrypt and decrypt text in images to improve secret communication. An extensive investigation of the use, experimentation, and assessment of a hidden writing strategies to better understand how concealed communication promotes protected interaction and addresses ongoing difficulties.
Zainab Abdulhameed Alher   +2 more
openaire   +1 more source

Sputnik as a tool for securing geodetic information

Journal of the Franklin Institute, 1958
Abstract A simplified picture is employed for utilizing Sputnik tracking data (perigee, apogee, period, maximum and minimum orbital velocity) in the determination of the Earth's mass and radius. For this purpose, basic characteristics of the motion are conveniently re-expressed in terms of the perigee and apogee parameters.
openaire   +1 more source

THE TOOLS OF INFORMATION SUPPORT OF REGIONAL SECURITY MANAGEMENT

История науки и техники, 2019
В статье рассматриваются вопросы организации информационной поддержки обеспечения риск-устойчивого регионального развития. Авторы приводят научно-практические результаты своей деятельности, направленной на создание информационных технологий управления региональной безопасностью. Детально рассматриваются полимодельный комплекс, информационная технология
openaire   +1 more source

Analysis of information security methods in biosystems and application of intelligent tools in information security systems

2020
In this paper, the methods of information protection in bio systems are studied. The paper considers the use of intelligent tools in information security systems and the use of adaptive information security systems. Several articles on the field of information protection in bio systems are analyzed.
openaire   +1 more source

Cancer epigenetics in clinical practice

Ca-A Cancer Journal for Clinicians, 2023
Veronica Davalos, Manel Esteller
exaly  

An Optimal Set Of Information Security Tools

European Proceedings of Social and Behavioural Sciences, 2021
openaire   +1 more source

Home - About - Disclaimer - Privacy