ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Education
Computing
Architecture and Urbanism
Administration - Business
Communication
Economy
Literature
Research
Social Sciences
all records (69)

Languages
English
Spanish
Portuguese
French

Countries
Indonesia
Ukraine
USA
Canada
Brazil
South Africa
United Kingdom
Australia
Austria
Romania
all records (69)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
78.543  Articles
1 of 7.855 pages  |  10  records  |  more records»
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease l... see more

In the Digital Transformation era, technological developments are developing more rapidly, along with the increasingly intensive use of technology, cyber threats are also increasing with a wide variety of attacks. The emergence of various issues regarding... see more

The development of reliable systems for protecting speech information that can protect it from being intercepted by cybercriminals is a fundamental task of the security service of organizations and firms. For these purposes, active jamming systems are use... see more

The article analyzes the parameters of social networks. The analysis is performed to identify critical threats. Threats may lead to leakage or damage to personal data. The complexity of this issue lies in the ever-increasing volume of data. Analysts note ... see more

This study aims to track insider trading activities prior to announcement of merger and acquisition deals in Istanbul Stock Exchange. 35 companies and 50 deals are examined for the period 2002 -2013 and significant average abnormal returns one months to t... see more

The use of spline approximation method for studying the information security problem tasks is considered in the article. The all possible technical channels of information leakage must be considered and researched for assessing information security. The u... see more

The pace of development of information technology in recent years has prompted the introduction of computer technology in the processes of command and control. This, in turn, was reflected in the reverse side of this process, namely, interest grew in info... see more

1 of 7.855 pages  |  10  records  |  more records»