Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Unauthorised access"'
Publikováno v:
Proceedings on Engineering Sciences, Vol 5, Iss 2, Pp 227-238 (2023)
Due to the intensive use of the Internet, network security is becoming a key foundation for all web applications. Intrusion detection by analysing records in network processes is an important way to solve problems in the field of network security. It
Externí odkaz:
https://doaj.org/article/83100f3ec53e45f395a6a3ee040894aa
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 47, Iss 1, Pp 72-85 (2020)
Abstract. Aim Important contemporary trends in the theory and functional practice of secure automated systems at informatisation facilities of internal affairs bodies include an increase in the number of threats realised through remote unauthorised a
Externí odkaz:
https://doaj.org/article/0d2de7a02a3c4fa7ae4a06e295946153
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 47, Iss 1, Pp 58-71 (2020)
Abstract. Aim Currently, the implementation of computational experiments to determine the probabilistic-temporal characteristics of protection functions for automated information systems is a complex and costly task. In order to study the dynamics of
Externí odkaz:
https://doaj.org/article/ddb9079f373e4ce689ec26bdbc84ee6b
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 46, Iss 4, Pp 123-133 (2020)
Objectives. In order to determine the security of a special-purpose informatisation object, it is necessary to calculate the effectiveness indicators of information security (IS) measures aimed at preventing unauthorised access (UA) threats associate
Externí odkaz:
https://doaj.org/article/1dc99da1005b4c98ac693e138e6b0081
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 44, Iss 4, Pp 99-113 (2018)
Abstract. Objectives An analysis of open access literature sources and normative documents on the problem of information protection in automated systems was carried out. This showed the absence in these documents of quantitative parameters of the pro
Externí odkaz:
https://doaj.org/article/8b2d147263784fe7aec73b10b6a56d15
Publikováno v:
Data in Brief, Vol 36, Iss , Pp 107094- (2021)
Mouse dynamics is a hot topic under study in session-based authentication and intrusion detection in privileged access management systems. We contribute to this topic, which develops with the increase of big data capabilities, with a missing data set
Externí odkaz:
https://doaj.org/article/231f582885f641dfa425dc79a6bcdf74
Autor:
A. M. Kadnova
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 46, Iss 3, Pp 87-96 (2019)
Objectives At present, in accordance with the requirements of the guiding documents of the Federal Service for Technical and Export Control (FSTEC) of Russia, as well as international standards in the development and operation of protected automated
Externí odkaz:
https://doaj.org/article/e4faa8082fef43deaf4096cb7b161d46
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 45, Iss 1, Pp 147-159 (2018)
Objectives. In order to investigate the property of the operational effectiveness of automated systems for protecting information from unauthorised access, it is necessary to analyse the normative documents (both international and Russian) and scient
Externí odkaz:
https://doaj.org/article/54034c0a92d94ef2ab17f0b1163e896e
Publikováno v:
Applied Computer Systems, Vol 21, Iss 1, Pp 38-45 (2017)
The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capita
Externí odkaz:
https://doaj.org/article/a8bbce900acb47b59f41e5b36f530eb5