Results 21 to 30 of about 305,823 (288)
Objectives. Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the ...
I. G. Drovnikova +2 more
doaj +1 more source
This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling ...
Aleksei A. Gavrishev, Aleksandr P. Zhuk
doaj +1 more source
Design and Implementation of an Automated Dynamic Rule System for Distributed Firewalls
Zero-day vulnerabilities are undisclosed security flaws exploited by attackers to gain unauthorized access to vulnerable systems. Firewalls and antivirus software are essential for preventing intrusions.
TUDOSI, A.-D. +4 more
doaj +1 more source
Lossless and Reversible Data Hiding using Public Key Cryptography [PDF]
In today’s world, the internet is a platform, where large amount of data can be obtained and transferred. Different technologies and internet access are used to transfer the data which can be accessed by authorized and unauthorized users.The major ...
Shetye Pooja +4 more
doaj +1 more source
Assessment of information protection level against unauthorized access
The object of research. The study considers an effective method of assessing the information protection level in a computer network against unauthorized access based on the security graph. Investigated problem. Existing approaches to assessing the information protection level against unauthorized access have certain shortcomings: the real structure of
Svitlana Onyshchenko +3 more
openaire +1 more source
Blockchain-enabled EHR access auditing: Enhancing healthcare data security
In the realm of modern healthcare, Electronic Health Records EHR serve as invaluable assets, yet they also pose significant security challenges. The absence of EHR access auditing mechanisms, which includes the EHR audit trails, results in accountability
Faheem Ullah +7 more
doaj +1 more source
MULTI-AGENT SYSTEM OF PROTECTING INFORMATION FROM UNAUTHORIZED ACCESS [PDF]
This article lists methods and tools for unlocking data from the local network. Modern methods and software tools for protecting data from unauthorized access from local area network have been analyzed.
Bekmurodov, T. F., Botirov, F. B.
core +1 more source
Light‐Induced Entropy for Secure Vision
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo +9 more
wiley +1 more source
Objectives. At present, conducting a computational experiment on a system for protecting information from unauthorized access operated in an automated system is a time consuming process.
O. I. Bokova +3 more
doaj +1 more source
Objective. A characteristic feature of the current stage of development of the sphere of informatization of internal affairs bodies (OVD) is a significant increase in the volume and variety of types of service information of limited distribution, stored,
T. V. Meshcheryakova +4 more
doaj +1 more source

