Results 1 to 10 of about 1,014,505 (247)
Searching for and blocking destructive content in images [PDF]
Children and underage teenagers use the Internet not only for communication. So, for 2020, children aged five to seven years in half of cases use the network to play online games, at the age of eight to eleven years, this figure increases to 78%, and ...
Zelensky Alexander +4 more
doaj +1 more source
Human rıghts factor ın the regulatıon of relatıonshıps ın the fıeld of ınformatıon
The article broadly analyzes human rights factor in the regulation of relations in the field of information on the basis of the diversity of opinions existing in the legal literature and norms of international law.
A. Aliyev, L. Hashimova
doaj +1 more source
The protection of information against electromagnetic penetration is one of the most important aspects related to the protection of information against its non-invasive acquisition. Compared to the activities of cybercriminals, the use of electromagnetic
Ireneusz Kubiak, Artur Przybysz
doaj +1 more source
The article presents a method of improving the readability of images obtained in the process of electromagnetic infiltration for sources processing information in a visual form (texts, images).
Ireneusz Kubiak, Artur Przybysz
doaj +1 more source
Objective. The aim of the work is to assess the possibility of applying the theory of “gray systems” to build a methodology for predicting the number of identified vulnerabilities in conditions of uncertainty of influencing factors and lack of initial ...
A. O. Efimov +2 more
doaj +1 more source
Possibilities of Electromagnetic Penetration of Displays of Multifunction Devices
A protection of information against electromagnetic penetration is very often considered in the aspect of the possibility of obtaining data contained in printed documents or displayed on screen monitors.
Ireneusz Kubiak +2 more
doaj +1 more source
Selected aspects of cyber security from the point of view of recent legislation [PDF]
Cyber security issues can be considered as one of the most recent issues. The truth is that in today's modern society, which is known as information and technology society, in a globalized world and an integrated Europe, information is becoming more ...
Martin CHOVANEC
doaj
Impact of the operational environment on cyber threats [PDF]
The changed role of the military in contemporary conflicts and new tendencies in Rade V. Slavković and Dejan V. Kršljanin the consideration of issues of security and defense activities of the society have led to addressing much greater attention to the ...
Slavković Rade V., Kršljanin Dejan V.
doaj +1 more source
Information protection is an important safety issue in many human activity fields. Technological advances and related ubiquitous computerization bring new challenges in this area.
Andrzej Stańczak +3 more
doaj +1 more source
The article deals with resilience and protection of critical information infrastructure elements. The elements affect rapid recovery of the system to its original state and the increase of resistance during the subsequent emergency events.
Petr Hruza
doaj +1 more source

