Zobrazeno 1 - 10
of 10
pro vyhledávání: '"I. G. Drovnikov"'
Autor:
I. G. Drovnikova, A. D. Popova
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 51, Iss 1, Pp 68-78 (2024)
Objective. The purpose of the study is to theoretically analyze security defects and study the criticality of vulnerabilities in software used in modern automated systems of internal affairs agencies.Method. A systematic approach method was used to c
Externí odkaz:
https://doaj.org/article/65f7febd02c44013ab05d0787f03eb1b
Autor:
I. G. Drovnikova, A. D. Popova
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 50, Iss 4, Pp 85-92 (2024)
Objective. The purpose of the article is to analyze existing methods and procedures used to assess the level of software security of automated systems, based on a study of scientific literature, international and industry standards of the Russian Fed
Externí odkaz:
https://doaj.org/article/b395f0cfb9d945e8ae42ca5ead72d0a7
Autor:
A. I. Miftahova, E. I. Yangirov, E. I. Karaseva, A. I. Yangirov, E. Yu. Nikulina, I. G. Drovnikova
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 50, Iss 1, Pp 114-122 (2023)
Objective. The aim of the research work is to develop a software solution for identifying trends in demand for consumer goods by analyzing big data.Method. To achieve this goal, the work analyzed the current state of development of the Internet retai
Externí odkaz:
https://doaj.org/article/03662189743e49618d72d4e3807336c0
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 49, Iss 4, Pp 52-57 (2023)
Objective. This paper considers protection against threats that occur more often in the period from the start of the operating system boot. Consideration of various configurations will allow an overview of a fairly wide range of situations that arise
Externí odkaz:
https://doaj.org/article/45bbcbf8eeae45b7b20c0c0883a3930e
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 49, Iss 4, Pp 97-103 (2023)
Objective. When solving a scientific problem related to assessing the security of automated systems of internal affairs bodies, in particular, when developing a methodology for quantifying protected automated systems of internal affairs bodies, the f
Externí odkaz:
https://doaj.org/article/6bee479cc54b4319a58b35faeca65de0
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 46, Iss 1, Pp 90-102 (2019)
Objectives. At present, conducting a computational experiment on a system for protecting information from unauthorized access operated in an automated system is a time consuming process. The greatest difficulty in this area of research is the determi
Externí odkaz:
https://doaj.org/article/fab28e8236e541dd8dd9ff7b56e4526d
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 47, Iss 2, Pp 40-51 (2020)
Aim. One of the key objectives of the theory and practice of information security is to analyse the functioning of protected automated systems, particularly those operated at computerized facilities of internal affairs bodies. In order to identify po
Externí odkaz:
https://doaj.org/article/9c957beffe4649ddafda723b4c32ad75
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 47, Iss 1, Pp 72-85 (2020)
Abstract. Aim Important contemporary trends in the theory and functional practice of secure automated systems at informatisation facilities of internal affairs bodies include an increase in the number of threats realised through remote unauthorised a
Externí odkaz:
https://doaj.org/article/0d2de7a02a3c4fa7ae4a06e295946153
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 46, Iss 2, Pp 37-49 (2019)
Objectives Traditional methods for solving the problem of protecting the information resource of electronic document management systems based on protective basic functions (identification, authentication and verification of users, etc.) of available
Externí odkaz:
https://doaj.org/article/9a36ad0e41714469b5a96d72d4156547
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 45, Iss 3, Pp 114-122 (2019)
Objectives. Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the foll
Externí odkaz:
https://doaj.org/article/d26a8dca6b134761ac2f7b2ff2fd3776