Results 21 to 30 of about 305,823 (288)

PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2019
Objectives. Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the ...
I. G. Drovnikova   +2 more
doaj   +1 more source

Development of a wireless protection against imitation system for identification and control of vehicle access

open access: yesБезопасность информационных технологий, 2018
This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling ...
Aleksei A. Gavrishev, Aleksandr P. Zhuk
doaj   +1 more source

Design and Implementation of an Automated Dynamic Rule System for Distributed Firewalls

open access: yesAdvances in Electrical and Computer Engineering, 2023
Zero-day vulnerabilities are undisclosed security flaws exploited by attackers to gain unauthorized access to vulnerable systems. Firewalls and antivirus software are essential for preventing intrusions.
TUDOSI, A.-D.   +4 more
doaj   +1 more source

Lossless and Reversible Data Hiding using Public Key Cryptography [PDF]

open access: yesITM Web of Conferences, 2020
In today’s world, the internet is a platform, where large amount of data can be obtained and transferred. Different technologies and internet access are used to transfer the data which can be accessed by authorized and unauthorized users.The major ...
Shetye Pooja   +4 more
doaj   +1 more source

Assessment of information protection level against unauthorized access

open access: yesScienceRise, 2023
The object of research. The study considers an effective method of assessing the information protection level in a computer network against unauthorized access based on the security graph. Investigated problem. Existing approaches to assessing the information protection level against unauthorized access have certain shortcomings: the real structure of
Svitlana Onyshchenko   +3 more
openaire   +1 more source

Blockchain-enabled EHR access auditing: Enhancing healthcare data security

open access: yesHeliyon
In the realm of modern healthcare, Electronic Health Records EHR serve as invaluable assets, yet they also pose significant security challenges. The absence of EHR access auditing mechanisms, which includes the EHR audit trails, results in accountability
Faheem Ullah   +7 more
doaj   +1 more source

MULTI-AGENT SYSTEM OF PROTECTING INFORMATION FROM UNAUTHORIZED ACCESS [PDF]

open access: yes, 2019
This article lists methods and tools for unlocking data from the local network. Modern methods and software tools for protecting data from unauthorized access from local area network have been analyzed.
Bekmurodov, T. F., Botirov, F. B.
core   +1 more source

Light‐Induced Entropy for Secure Vision

open access: yesAdvanced Materials, EarlyView.
This work realized a ternary true random number generator by exploiting stochastic traps emerging within multiple junction interfaces, and quantitatively validated the generation of high‐quality random numbers. Furthermore, it successfully demonstrated diverse applications, including AI‐resilient image security, thereby providing a valuable guide for ...
Juhyung Seo   +9 more
wiley   +1 more source

MODEL OF THE PROCESS OF FUNCTIONING OF THE INFORMATION PROTECTION SYSTEM FROM UNAUTHORIZED ACCESS CREATED IN THE SOFTWARE ENVIRONMENT OF IMITATION MODELING "CPN TOOLS"

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2019
Objectives. At present, conducting a computational experiment on a system for protecting information from unauthorized access operated in an automated system is a time consuming process.
O. I. Bokova   +3 more
doaj   +1 more source

Methodical approach to quantitative assessment of the risks of the implementation of threats unauthorized access to an information resource automated systems of internal affairs bodies

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2022
Objective. A characteristic feature of the current stage of development of the sphere of informatization of internal affairs bodies (OVD) is a significant increase in the volume and variety of types of service information of limited distribution, stored,
T. V. Meshcheryakova   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy