Results 11 to 20 of about 4,404,286 (307)
The article deals with resilience and protection of critical information infrastructure elements. The elements affect rapid recovery of the system to its original state and the increase of resistance during the subsequent emergency events.
Petr Hruza
doaj +1 more source
Maximizing Sharing of Protected Information
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
S. Dawson +3 more
openaire +3 more sources
Assessment of information security risks of automated system using neuro-fuzzy logic
Objective. Automated systems are widely used in production, and an important criterion for their reliability is information security. The aim of the study is to provide a balance between possible losses as a result of the implementation of threats and ...
A. R. Aydinyan, O. L. Tsvetkova
doaj +1 more source
Protected realizations of quantum information [PDF]
17 ...
openaire +2 more sources
Protecting Privacy of Genomic Information
The ISO/IEC committee in charge of standardizing the well-known MPEG audiovisual standards has launched, in cooperation with the ISO committee on Biotechnology, a new activity for efficient compressed storage and transmission of genomic information. The paper presents proposals for adding privacy and security to such in-progress standards.
Delgado Mercè, Jaime +2 more
openaire +5 more sources
Communicating the protection of information privacy
The world economic system’s transformation from a dominant mass-production model to a mass-customisation model is seen to have created a demand for personal information from consumers.
Yolanda Jordaan, André Cillié Jordaan
doaj +1 more source
Public management and administration in the context of protecting its information space
The dominant problem of the formation of effective principles of public administration in Ukraine is the need for its safe functioning as well as on the administrative, program and procedural level.
A.O. Azarova +4 more
doaj +1 more source
Information relations as an object of criminal law protection in the information society
The rapid development of information and communication technologies and communication networks leads to an intensification of the circulation of information, an increase in the possibilities of its use for destructive purposes and an increase in the ...
Ryma Kliuchko
doaj +1 more source
Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side [PDF]
The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side.
Buriachok, Volodymyr +7 more
core
Time Protection: the Missing OS Abstraction [PDF]
Timing channels enable data leakage that threatens the security of computer systems, from cloud platforms to smartphones and browsers executing untrusted third-party code.
Acıiçmez Onur +22 more
core +2 more sources

