Search

Your search keyword '"lcsh:Q350-390"' showing total 79 results

Search Constraints

Start Over You searched for: Descriptor "lcsh:Q350-390" Remove constraint Descriptor: "lcsh:Q350-390" Publisher national research nuclear university mephi (moscow engineering physics institute) Remove constraint Publisher: national research nuclear university mephi (moscow engineering physics institute)
79 results on '"lcsh:Q350-390"'

Search Results

1. Analysis of information security threats when processing confidential data in mobile systems

2. Topical issues of the problem of assessment of threats of cyber attacks on information resources of significant facilities of critical information infrastructure

3. Obfuscation of logic schemes of pseudo-random number generators based on linear and non-linear feedback shift registers

4. Reengineering of business processes of a commercial bank in the information space

5. Analysis of the structure of construction and the main tactical and technical characteristics of automated security systems for stationary remote objects of increased security

6. Protection of the data integrity in telemetry systems about the state of mobile objects

7. Systematization of security characteristics of educational activities for training specialists in the field of information security

8. Investigation of information security issues for graph databases suitable for big data processing while detecting money laundering and terrorism financing cases

9. Features of the risk-based approach to ensure cyber security of industrial facilities

10. Adapted method for monitoring functional failures in NOR FLASH-memory during tests for resistance to heavy charged particles

11. Network attacks main danger indicators formation in Internal Affairs Bodies automated systems

12. Information security of state information systems

13. Algorithm for matching physical and logical addressing in memory chips using laser sources

14. Simulation of organizational protection of a protected object based on the theory of automata and Petri nets

15. Trust Model for the Russian Federation Digital Economy

16. On the issue of categorization of objects of critical information infrastructure of seaports

17. Assessment of probabilities of computer attacks based on function

18. Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies

19. Software implementation of a DLP-system module for monitoring and controlling corporate network traffic using machine learning

20. Single event effects qualificatoin of integrated circuits

21. Analysis and classification of the main threats to information security of automated systems at the objects of informatization of internal affairs bodies

22. Approach to steganography storage in removable media file system

23. Hardness assurance levels and requirements for single event effects testing of integrated circuits

24. A methodological approach to identifying destructive information actions on a distributed process control system

25. Approaches to measuring the risk of cyberattacks in remote banking services of Russia

26. Security of significant objects of critical information infrastructure

27. Development of EPC-Models of threats to information security of the automated process control system

28. Possibilities and limitations of focused laser technique application for SEE sensitivity parameters estimation

29. Information security systematics of software supply chains

30. Cold multi-currency wallet on the platform MKT

31. Investigation of graph databases suitable for work with big data while detecting money laundering and terrorism financing cases

32. Development of an imitation model of information protection system from unauthorized access using the cpn tools software

33. A comparative analysis of software identifying approaches

34. Development of algorithm for assessment risk of cyber attacks in electronic banking

35. About approaches to a universal distributed trusted registry to ensure confidentiality of system information

36. Development trends and safety of language in terms of globalization

37. Building an analytical system for event analysis to ensure information security of the enterprise

38. System analysis for evaluating the effectiveness of tools for information security

39. Assessment of threats to the security of the cryptographic authentication mechanisms of the monitor devices of vehicles

40. Coordinate hiding in solving the generalized dangerous proximity problem

41. Model of the life cycle of the information security system

42. The structure and content of the convention on combating cybercrime

43. Some information security problems of cloud data storage

44. A network traffic analysis for critical automation system state detection in industrial networks

45. Method for investigating computer incidents based on attribute clustering

46. Safety assessment functional model of distance learning system

47. Precision’s calculation of the security assessment of wireless alarm

48. Development of the security monitoring system for cluster of information systems based on the Ruby on Rails framework

49. JPEG digital watermarking for copyright protection

50. How the ecosystem of digital assistants can ensure the security of personal data

Catalog

Books, media, physical & digital resources