-
METHODOLOGY OF CONSTRUCTION OF CLASSIFIER OF THREATS TO STATE INFORMATIVE RESOURCES
Mathematical aspects of the use a lot of alternative rules is in tasks of channel encoding
АНАЛІЗ НОРМАТИВНО-ПРАВОВОГО ЗАБЕЗПЕЧЕННЯ ЗАХИСТУ ІНФОРМАЦІЇ СУЧАСНИХ ІКСМ
Methods and systems for the detection of unauthorized access to modern information and...
Implementation of audit & monitoring environment of modern information and...
Analysis of existing authentication systems of information and communication systems...
INCREASE OF AUTHENTICITY OF PROCEEDING IN INFORMATIVE STREAMS
Organization of information security based on a risk assessment system
Аналіз існуючих методів кодування при забезпеченні цілісності інформації в сучасних ІКСМ
METHODS TO INCREASE STABILITY STEGANOSYSTEM FROM UNAUTHORIZED ACCESS
Modern methods of auditing and monitoring tasks in information security
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only entries containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"