Zobrazeno 1 - 10
of 10 766
pro vyhledávání: '"Security information"'
Autor:
Nazar Diakiv
Publikováno v:
Публічне управління та регіональний розвиток, Vol 25, Pp 776-797 (2024)
The article deals with the problem of protecting Ukraine’s national interests in the context of the Russian-Ukrainian war. The Internet is seen as a space for free expression of opinions, but often turns into a battlefield in the information war. T
Externí odkaz:
https://doaj.org/article/d0c053553b0343c887d493221404a31f
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 124-136 (2024)
The purpose of this article is to develop a model for an access control policy and to formulate a method for creating a model of information security threat scenarios in industrial control system (ICS). The results of developing an access control pol
Externí odkaz:
https://doaj.org/article/1dc0e7a55fa040fdbebdaad2eee16900
Autor:
Akashdeep Bhardwaj, Salil Bharany, Ashraf Osman Ibrahim, Ahmad Almogren, Ateeq Ur Rehman, Habib Hamam
Publikováno v:
Egyptian Informatics Journal, Vol 27, Iss , Pp 100513- (2024)
The concept of the Internet of Things (IoT) threat surface refers to the overall susceptibility of smart devices to potential security risks. This vulnerability includes the combined impact of security weaknesses, gaps in protective measures, and pot
Externí odkaz:
https://doaj.org/article/2d802fac30d944a8b6f4fbd8f6bffbeb
Autor:
AL-Nuaimi, Maryam Nasser
Publikováno v:
Global Knowledge, Memory and Communication, 2022, Vol. 73, Issue 1/2, pp. 1-23.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/GKMC-12-2021-0209
Publikováno v:
International Journal of Intelligent Networks, Vol 5, Iss , Pp 101-109 (2024)
Every day, more people use the internet to send and receive sensitive information. A lot of confidential data is being transmitted electronically between people and businesses. Cyber-attacks, which are the inevitable result of our growing reliance on
Externí odkaz:
https://doaj.org/article/400c65dd1d43435aa24ddfe2942d7c31
Vulnerability of the Key Sharing Protocol Executing over the Noiseless Public Channels with Feedback
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 35, Iss 1, Pp 379-https://youtu.be/KGvf_R_mLjY (2024)
It has been proven that several recently published protocols for exchanging keys over noiseless channels by the same authors as in the current paper have real vulnerability to eavesdropping rooted in the attacker’s receiver optimization procedu
Externí odkaz:
https://doaj.org/article/af9df0169cff4d95a311c827f410bb18
Publikováno v:
In International Journal of Intelligent Networks 2024 5:101-109
Publikováno v:
Journal of Information Technology Management, Vol 15, Iss 2, Pp 1-13 (2023)
The article is devoted to the modern development of high technologies and computer technology greatly enhanced the development of automated banking systems of banking sector organizations and allowed the synthesis of information and communication tec
Externí odkaz:
https://doaj.org/article/03af050cb4764af7ae909354358008af
Publikováno v:
Biomimetics, Vol 9, Iss 6, p 307 (2024)
In the complex and dynamic landscape of cyber threats, organizations require sophisticated strategies for managing Cybersecurity Operations Centers and deploying Security Information and Event Management systems. Our study enhances these strategies b
Externí odkaz:
https://doaj.org/article/d306c62f0be342e39ec977339dc634fe
Publikováno v:
Безопасность информационных технологий, Vol 30, Iss 1, Pp 81-91 (2023)
Information security tools are an integral part of system users. The concept of information security implies the development and expansion of the scope of innovative technologies in information processing. To keep the information security system up t
Externí odkaz:
https://doaj.org/article/25d4111110d54aa69b84e34d341b3525