Results 11 to 20 of about 4,404,286 (307)

Resilience and Protection of Critical Information Infrastructure Resilience and Protection of Critical Information Infrastructure

open access: yesCommunications, 2018
The article deals with resilience and protection of critical information infrastructure elements. The elements affect rapid recovery of the system to its original state and the increase of resistance during the subsequent emergency events.
Petr Hruza
doaj   +1 more source

Maximizing Sharing of Protected Information

open access: yesJournal of Computer and System Sciences, 2002
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
S. Dawson   +3 more
openaire   +3 more sources

Assessment of information security risks of automated system using neuro-fuzzy logic

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2023
Objective. Automated systems are widely used in production, and an important criterion for their reliability is information security. The aim of the study is to provide a balance between possible losses as a result of the implementation of threats and ...
A. R. Aydinyan, O. L. Tsvetkova
doaj   +1 more source

Protecting Privacy of Genomic Information

open access: yes, 2017
The ISO/IEC committee in charge of standardizing the well-known MPEG audiovisual standards has launched, in cooperation with the ISO committee on Biotechnology, a new activity for efficient compressed storage and transmission of genomic information. The paper presents proposals for adding privacy and security to such in-progress standards.
Delgado Mercè, Jaime   +2 more
openaire   +5 more sources

Communicating the protection of information privacy

open access: yesCommunicare, 2022
The world economic system’s transformation from a dominant mass-production model to a mass-customisation model is seen to have created a demand for personal information from consumers.
Yolanda Jordaan, André Cillié Jordaan
doaj   +1 more source

Public management and administration in the context of protecting its information space

open access: yesВісник Житомирського державного технологічного університету: Серія: економіка, управління та адміністрування, 2019
The dominant problem of the formation of effective principles of public administration in Ukraine is the need for its safe functioning as well as on the administrative, program and procedural level.
A.O. Azarova   +4 more
doaj   +1 more source

Information relations as an object of criminal law protection in the information society

open access: yesAnalele Ştiinţifice ale Universităţii "Al.I. Cuza" din Iaşi. Ştiinţe Juridice, 2022
The rapid development of information and communication technologies and communication networks leads to an intensification of the circulation of information, an increase in the possibilities of its use for destructive purposes and an increase in the ...
Ryma Kliuchko
doaj   +1 more source

Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side [PDF]

open access: yes, 2020
The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side.
Buriachok, Volodymyr   +7 more
core  

Time Protection: the Missing OS Abstraction [PDF]

open access: yes, 2018
Timing channels enable data leakage that threatens the security of computer systems, from cloud platforms to smartphones and browsers executing untrusted third-party code.
Acıiçmez Onur   +22 more
core   +2 more sources

Home - About - Disclaimer - Privacy