Results 21 to 30 of about 130,608 (266)
The article investigates the problem of information security of critical information infrastructures. The features of critical objects from the point of view of collecting, processing, storing and transmitting information are analysed.
V. A. Gasimov, J. I. Mammadov
doaj +1 more source
Today, there is a high demand for remote rehabilitation using mobile robotic complexes all over the world. They offer a wide range of options for convenient and effective therapy at home to patients and the elderly, especially those bedridden after ...
Assylbek Ozhiken +7 more
doaj +1 more source
Model of the life cycle of the information security system
When building an information security system, one of the key problems is the creation of regulatory documents. Regulators in the field of information security determine the list of necessary documentation mainly in relation to protection mechanisms ...
Anton A. Konev +4 more
doaj +1 more source
Innovative Technologies in Cybersecurity
The digital transformation of any organization must include cybersecurity, without which it is impossible to build a reliable information system. Today, many existing software products, security tools, and IT systems do not match the new environment in ...
Sergey Lebed
doaj +1 more source
DEVELOPMENT OF BIOMETRIC METHODS AND INFORMATION SECURITY TOOLS
Now a day’s security is a big issue, the whole world has been working on the face recognition techniques as face is used for the extraction of facial features. An analysis has been done of the commonly used face recognition techniques. This paper presents a system for the recognition of face for identification and verification purposes by using ...
T. Zh. Mazakov, D. N. Narynbekovna
openaire +1 more source
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard +8 more
wiley +1 more source
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman +2 more
wiley +1 more source
THE RISKS OF CYBERSECURITY OF FINANCIAL INSTITUTIONS AND POSSIBLE METHODS FOR THEIR ELIMINATION* [PDF]
The study addresses issues related to the use of information technology in the field of financial organizations. In addition, the authors considered the sources of cybersecurity risks in these organizations and the ...
Andrei PETROIA, Ivan BANU
doaj
Monitoring tools of regional economic security [PDF]
Ensuring the economic security of the region is one of the key tasks of the management of the federal entity. By ensuring economic security, the priorities of the management of the region are determined, so that the system of economic security should be ...
Husainova E.A. +4 more
doaj +1 more source
Tunneling Activities Detection Using Machine Learning Techniques
Tunnel establishment, like HTTPS tunnel or related ones, between a computer protected by a security gateway and a remote server located outside the protected network is the most effective way to bypass the network security policy.
Fabien Allard +3 more
doaj +1 more source

