Zobrazeno 1 - 10
of 400
pro vyhledávání: '"unauthorized access"'
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 3, Pp 94-104 (2024)
The article develops a functional model of unauthorized access (UA) protection mechanisms at information infrastructure objects (IIOs). It defines the content of protection measures, techniques used, and stages of their implementation. It substantiat
Externí odkaz:
https://doaj.org/article/040087f8c4ba48e784564d84b0a22e58
Publikováno v:
Безопасность информационных технологий, Vol 30, Iss 4, Pp 61-73 (2023)
The content of the main threat assessment stages of unauthorized access (UA) at critical information infrastructure (CII) facilities is determined on the basis of analysis of the primary provisions of the Methodology for Assessing Information Securit
Externí odkaz:
https://doaj.org/article/a10d4dd3bac74974b7365ddc80241788
Autor:
Alexey V. Astrakhov, Alexander N. Stadnik, Kirill S. Skryl, Ivan I. Korovin, Elvira R. Bashaeva
Publikováno v:
Безопасность информационных технологий, Vol 30, Iss 1, Pp 70-80 (2023)
The paper is devoted to the study of factors affecting the timeliness of response to the effects of malicious software. The analysis of anti-virus protection tools in computer systems is carried out. The analysis is based on expert assessments of pro
Externí odkaz:
https://doaj.org/article/8c592a8f954c403cb5d3efbf6b9be0c6
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 49, Iss 3, Pp 91-103 (2022)
Objective. A characteristic feature of the current stage of development of the sphere of informatization of internal affairs bodies (OVD) is a significant increase in the volume and variety of types of service information of limited distribution, sto
Externí odkaz:
https://doaj.org/article/cc8e8320180440b0a4f74b38bad96fce
Autor:
Gudinavičius, Arūnas, Grigas, Vincas
Publikováno v:
Online Information Review, 2021, Vol. 46, Issue 5, pp. 886-903.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/OIR-03-2021-0133
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki, Vol 21, Iss 5, Pp 755-766 (2021)
The paper deals with the problem of unauthorized use in deep learning of facial images from social networks and analyses methods of protecting such images from their use and recognition based on de-identification procedures and the newest of them —
Externí odkaz:
https://doaj.org/article/cf899db4ee8a4b04bce157b042c79538
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Безопасность информационных технологий, Vol 28, Iss 3, Pp 28-43 (2021)
The goal of the paper is to substantiate the laws of time distribution at various stages of the implementation of network attacks in protected automated systems of internal affairs bodies. To achieve this goal, a full-scale experiment to study the dy
Externí odkaz:
https://doaj.org/article/8521f78656c24e2183833db00749c4bc
Publikováno v:
Вестник Дагестанского государственного технического университета: Технические науки, Vol 48, Iss 2, Pp 29-39 (2021)
Objective. The purpose of the article is to analyse the existing methodology used to assess the efficiency of automated information security systems by studying open literature sources, international and industry standards of the Russian Federation o
Externí odkaz:
https://doaj.org/article/2f0f341088d6496f9e5c0a9ef267d7aa