Results 1 to 10 of about 1,014,505 (247)

Searching for and blocking destructive content in images [PDF]

open access: yesE3S Web of Conferences, 2023
Children and underage teenagers use the Internet not only for communication. So, for 2020, children aged five to seven years in half of cases use the network to play online games, at the age of eight to eleven years, this figure increases to 78%, and ...
Zelensky Alexander   +4 more
doaj   +1 more source

Human rıghts factor ın the regulatıon of relatıonshıps ın the fıeld of ınformatıon

open access: yesХабаршы. Заң сериясы, 2022
The article broadly analyzes human rights factor in the regulation of relations in the field of information on the basis of the diversity of opinions existing in the legal literature and norms of international law.
A. Aliyev, L. Hashimova
doaj   +1 more source

Measurements and Correctness Criteria for Determining the Line Length of the Data Image Obtained in the Process of Electromagnetic Infiltration

open access: yesApplied Sciences, 2022
The protection of information against electromagnetic penetration is one of the most important aspects related to the protection of information against its non-invasive acquisition. Compared to the activities of cybercriminals, the use of electromagnetic
Ireneusz Kubiak, Artur Przybysz
doaj   +1 more source

Pseudo-Coloring as an Effective Tool to Improve the Readability of Images Obtained in an Electromagnetic Infiltration Process

open access: yesApplied Sciences, 2023
The article presents a method of improving the readability of images obtained in the process of electromagnetic infiltration for sources processing information in a visual form (texts, images).
Ireneusz Kubiak, Artur Przybysz
doaj   +1 more source

Forecasting the number of identified information security vulnerabilities based on the theory of “Gray Systems”

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2023
Objective. The aim of the work is to assess the possibility of applying the theory of “gray systems” to build a methodology for predicting the number of identified vulnerabilities in conditions of uncertainty of influencing factors and lack of initial ...
A. O. Efimov   +2 more
doaj   +1 more source

Possibilities of Electromagnetic Penetration of Displays of Multifunction Devices

open access: yesComputers, 2020
A protection of information against electromagnetic penetration is very often considered in the aspect of the possibility of obtaining data contained in printed documents or displayed on screen monitors.
Ireneusz Kubiak   +2 more
doaj   +1 more source

Selected aspects of cyber security from the point of view of recent legislation [PDF]

open access: yesKošická bezpečnostná revue, 2021
Cyber security issues can be considered as one of the most recent issues. The truth is that in today's modern society, which is known as information and technology society, in a globalized world and an integrated Europe, information is becoming more ...
Martin CHOVANEC
doaj  

Impact of the operational environment on cyber threats [PDF]

open access: yesВојно дело, 2015
The changed role of the military in contemporary conflicts and new tendencies in Rade V. Slavković and Dejan V. Kršljanin the consideration of issues of security and defense activities of the society have led to addressing much greater attention to the ...
Slavković Rade V., Kršljanin Dejan V.
doaj   +1 more source

The Possibility to Recreate the Shapes of Objects on the Basis of Printer Vibration in the Additive Printing Process

open access: yesApplied Sciences, 2021
Information protection is an important safety issue in many human activity fields. Technological advances and related ubiquitous computerization bring new challenges in this area.
Andrzej Stańczak   +3 more
doaj   +1 more source

Resilience and Protection of Critical Information Infrastructure Resilience and Protection of Critical Information Infrastructure

open access: yesCommunications, 2018
The article deals with resilience and protection of critical information infrastructure elements. The elements affect rapid recovery of the system to its original state and the increase of resistance during the subsequent emergency events.
Petr Hruza
doaj   +1 more source

Home - About - Disclaimer - Privacy