Results 21 to 30 of about 130,608 (266)

Model and Method for Determining the Optimal Structure of the Security System for Critical Information Infrastructure

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2023
The article investigates the problem of information security of critical information infrastructures. The features of critical objects from the point of view of collecting, processing, storing and transmitting information are analysed.
V. A. Gasimov, J. I. Mammadov
doaj   +1 more source

Research and Experimental Testing of a Remotely Controlled Ankle Rehabilitation Exoskeleton Prototype

open access: yesSensors
Today, there is a high demand for remote rehabilitation using mobile robotic complexes all over the world. They offer a wide range of options for convenient and effective therapy at home to patients and the elderly, especially those bedridden after ...
Assylbek Ozhiken   +7 more
doaj   +1 more source

Model of the life cycle of the information security system

open access: yesБезопасность информационных технологий, 2018
When building an information security system, one of the key problems is the creation of regulatory documents. Regulators in the field of information security determine the list of necessary documentation mainly in relation to protection mechanisms ...
Anton A. Konev   +4 more
doaj   +1 more source

Innovative Technologies in Cybersecurity

open access: yesСовременные информационные технологии и IT-образование, 2022
The digital transformation of any organization must include cybersecurity, without which it is impossible to build a reliable information system. Today, many existing software products, security tools, and IT systems do not match the new environment in ...
Sergey Lebed
doaj   +1 more source

DEVELOPMENT OF BIOMETRIC METHODS AND INFORMATION SECURITY TOOLS

open access: yesPHYSICO-MATHEMATICAL SERIES, 2021
Now a day’s security is a big issue, the whole world has been working on the face recognition techniques as face is used for the extraction of facial features. An analysis has been done of the commonly used face recognition techniques. This paper presents a system for the recognition of face for identification and verification purposes by using ...
T. Zh. Mazakov, D. N. Narynbekovna
openaire   +1 more source

The MedSupport Multilevel Intervention to Enhance Support for Pediatric Medication Adherence: Development and Feasibility Testing

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard   +8 more
wiley   +1 more source

Conserved structural motifs in PAS, LOV, and CRY proteins regulate circadian rhythms and are therapeutic targets

open access: yesFEBS Letters, EarlyView.
Cryptochrome and PAS/LOV proteins play intricate roles in circadian clocks where they act as both sensors and mediators of protein–protein interactions. Their ubiquitous presence in signaling networks has positioned them as targets for small‐molecule therapeutics. This review provides a structural introduction to these protein families.
Eric D. Brinckman   +2 more
wiley   +1 more source

THE RISKS OF CYBERSECURITY OF FINANCIAL INSTITUTIONS AND POSSIBLE METHODS FOR THEIR ELIMINATION* [PDF]

open access: yesEconomica, 2019
The study addresses issues related to the use of information technology in the field of financial organizations. In addition, the authors considered the sources of cybersecurity risks in these organizations and the ...
Andrei PETROIA, Ivan BANU
doaj  

Monitoring tools of regional economic security [PDF]

open access: yesE3S Web of Conferences, 2019
Ensuring the economic security of the region is one of the key tasks of the management of the federal entity. By ensuring economic security, the priorities of the management of the region are determined, so that the system of economic security should be ...
Husainova E.A.   +4 more
doaj   +1 more source

Tunneling Activities Detection Using Machine Learning Techniques

open access: yesJournal of Telecommunications and Information Technology, 2023
Tunnel establishment, like HTTPS tunnel or related ones, between a computer protected by a security gateway and a remote server located outside the protected network is the most effective way to bypass the network security policy.
Fabien Allard   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy