-
АНАЛІЗ НОРМАТИВНО-ПРАВОВОГО ЗАБЕЗПЕЧЕННЯ ЗАХИСТУ ІНФОРМАЦІЇ СУЧАСНИХ ІКСМ
Methods and systems for the detection of unauthorized access to modern information and...
Implementation of audit & monitoring environment of modern information and...
Analysis of existing authentication systems of information and communication systems...
INCREASE OF AUTHENTICITY OF PROCEEDING IN INFORMATIVE STREAMS
Organization of information security based on a risk assessment system
Аналіз існуючих методів кодування при забезпеченні цілісності інформації в сучасних ІКСМ
METHODS TO INCREASE STABILITY STEGANOSYSTEM FROM UNAUTHORIZED ACCESS
Modern methods of auditing and monitoring tasks in information security
METHODOLOGY OF CONSTRUCTION OF CLASSIFIER OF THREATS TO STATE INFORMATIVE RESOURCES
Mathematical aspects of the use a lot of alternative rules is in tasks of channel encoding
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only entries containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"