ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Education
Computing
Computing
Research
Architecture and Urbanism
Social Sciences
Communication
Pure sciences
Economy
all records (71)

Languages
English
Spanish
Portuguese
French
German

Countries
Indonesia
USA
Ukraine
Brazil
Switzerland
Austria
Canada
Spain
Romania
Italy
all records (68)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
5.548  Articles
1 of 556 pages  |  10  records  |  more records»
The article discusses the topical issue of improving the set of indicators of the cyber security system in information and telecommunication networks. Analyzed the latest research and publications on this issue. The analysis and experience of the anti-ter... see more

The article deals with model evaluation system level of data protection with the use of neural networks . The aggregate of security, which correspond to the object of information activities identified technical channels of information leakage at a given t... see more

The use of a wireless computer network in some institutions has become a very flexible option to connect all users of the existing computer network in the institution. This flexibility also has the disadvantage that anyone with a network password can take... see more

The use of spline approximation method for studying the information security problem tasks is considered in the article. The all possible technical channels of information leakage must be considered and researched for assessing information security. The u... see more

The article surveys the necessity of taking the measures to neutralize threats to national security in cyberspace, which are specified with the rapid growth of dependence of state and military authorities on the using of various automated control systems,... see more

Considering the application of wireless sensor networks (WSNs) in critical areas like war fields, establishing security in these networks is of great challenge. One of the important and dangerous attacks in these networks is the Sybil attack. In this atta... see more

In the article foreign, in particular, the Polish experience of diagnostic of students information and communication competencies is characterized. Foreign scientists focuse their modern searches on identifying students skills of using the Internet. Stand... see more

1 of 556 pages  |  10  records  |  more records»