Zobrazeno 1 - 10
of 14
pro vyhledávání: '"O. I. Bokova"'
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 50, Iss 4, Pp 75-84 (2024)
Objective. In modern conditions, cryptographic personal authentication technologies are used to access information systems, based on processing biometric information and converting the user’s biometric images into his personal access code. A curren
Externí odkaz:
https://doaj.org/article/182e3162bb4a49ef830cedd4f746278a
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 50, Iss 3, Pp 167-171 (2023)
Objective. The article provides a generalized algorithmization of the processes necessary for developing software for assessing the security of operating systems of automated information systems of internal affairs bodies of the Russian Federation.Me
Externí odkaz:
https://doaj.org/article/e81b34ae6c024503be4d92e50a3cc09e
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 49, Iss 4, Pp 45-51 (2023)
Objective. The article discusses the issue of creating an infrastructure solution that allows, on the basis of modern information technologies, to organize a fault-tolerant videoconferencing server in the judicial system. The choice of technologies w
Externí odkaz:
https://doaj.org/article/edb2bd7121a84f1aae165a2c41ade607
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 46, Iss 1, Pp 90-102 (2019)
Objectives. At present, conducting a computational experiment on a system for protecting information from unauthorized access operated in an automated system is a time consuming process. The greatest difficulty in this area of research is the determi
Externí odkaz:
https://doaj.org/article/fab28e8236e541dd8dd9ff7b56e4526d
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 45, Iss 4, Pp 68-77 (2019)
Objectives In order to improve the security of departmental information technology systems and the rationality of the financial costs of hardware solutions in such systems, it is advisable to develop a simulation model of the information technology s
Externí odkaz:
https://doaj.org/article/fd953ce1cf78486d9e65af42c6cf7aaa
Publikováno v:
Journal of Physics: Conference Series. 1691:012104
The article is concerned with solving of the practical and theoretical issues of usability characteristics assessment of systems of information protection from unauthorized access digital educational environment. A comparative analysis of innovative
Publikováno v:
Journal of Physics: Conference Series. 1691:012107
The article offers a procedural model for optimization of making queries against the digital education platform under the conditions of negative information impacts. The model is developed on the basis of the formalized description of the process of
Publikováno v:
Journal of Physics: Conference Series. 1691:012063
Based on the analysis of the verbal models for implementing some of the most dangerous and typical network attacks on the modern digital educational resources as well as of the formal models of their functioning developed using Petri-Markov networks,
Publikováno v:
Journal of Physics: Conference Series. 1479:012022
The article completes the cycle the articles by the authors assessing reliability of information security systems from the unauthorized access to automated systems. In includes previously unpublished materials. The article discloses main directions t
Publikováno v:
Journal of Physics: Conference Series. 1479:012021
This article through simulation provides the functioning mathematical model of information security system (ISS) from unauthorized access (UAA) in automated systems (AS). The model is developed in CPN Tools software environment for its analysis, gett