Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Larissa Cherckesova"'
Autor:
Olga Safaryan, Larissa Cherckesova, Parviz Sharifov, Pavel Razumov, Kirill Galov, Vladislav Chumakov, Alexey Popov
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783031110573
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9590dba1d05da7c17f198fe260bec532
https://doi.org/10.1007/978-3-031-11058-0_61
https://doi.org/10.1007/978-3-031-11058-0_61
Publikováno v:
Proceedings of the International Scientific and Practical Conference on Computer and Information Security.
Publikováno v:
E3S Web of Conferences. 363:03004
This article aims to explore the possibility of using the Kalman filter to filter images. The relevance of the study lies in the fact that at present the tasks of image processing have become of great importance in many areas, such as industry, scien
Autor:
Olga Safaryan, Larissa Cherckesova, Denis Korochentsev, Alexander Zelensky, Yelena Revyakina, Vladislav Chumakov, Irina Trubchik, Andrey Lobodenko
Publikováno v:
Journal of Physics: Conference Series. 2131:022100
Problem of safety ensuring of children and underage adolescents in Web–space is becoming increasingly acute. Younger generation information security is the state of children and adolescents protection, in which there is no risk associated with harm
Autor:
Olga Safaryan, Larissa Cherckesova, Nikita Lyashenko, Pavel Razumov, Vladislav Chumakov, Boris Akishin, Andrey Lobodenko
Publikováno v:
Journal of Physics: Conference Series. 2131:022099
This article discusses the issues related to the possibility of realization of collision cyberattacks (based on hash collisions). Since post–quantum cryptography has become relevant, classical cryptosystems do not provide the sufficient resistance
Autor:
Olga Safaryan, Larissa Cherckesova, Nikolay Boldyrikhin, Irina Pilipenko, Tatyana Nikishina, Dmitriy Medvedev, Andrey Lobodenko
Publikováno v:
Journal of Physics: Conference Series. 2131:032112
Article is devoted to the development of free program services for video conferencing. Proposed system eliminates security flaws found in other developments. Analysis of security model development using elliptic curves and secret key transfer using D