Search

Your search keyword '"lcsh:Q350-390"' showing total 939 results

Search Constraints

Start Over You searched for: Descriptor "lcsh:Q350-390" Remove constraint Descriptor: "lcsh:Q350-390" Topic lcsh:information technology Remove constraint Topic: lcsh:information technology
939 results on '"lcsh:Q350-390"'

Search Results

1. Features of information security of computer systems

2. Simulation of the dynamics of network attacks in automated systems of internal affairs bodies in the 'CPN Tools' software environment

3. Analysis of information security threats when processing confidential data in mobile systems

4. Topical issues of the problem of assessment of threats of cyber attacks on information resources of significant facilities of critical information infrastructure

5. Obfuscation of logic schemes of pseudo-random number generators based on linear and non-linear feedback shift registers

6. Reengineering of business processes of a commercial bank in the information space

7. Analysis of the structure of construction and the main tactical and technical characteristics of automated security systems for stationary remote objects of increased security

8. Universal triple encoding for compression and protecting binary data

9. Assessing the resilience of critical information infrastructures to information security threats

10. Protection of the data integrity in telemetry systems about the state of mobile objects

11. Using a virtual laboratory environment for penetration-testing skills training

12. Ensuring the security of state information systems in conditions of uncertainty

13. Analysis vulnerabilities of user authentication process using Active Directory

14. The distributed ledgers ensuring privacy-preserving transactions

15. Systematization of security characteristics of educational activities for training specialists in the field of information security

16. Investigation of information security issues for graph databases suitable for big data processing while detecting money laundering and terrorism financing cases

17. Features of the risk-based approach to ensure cyber security of industrial facilities

18. Adapted method for monitoring functional failures in NOR FLASH-memory during tests for resistance to heavy charged particles

19. Measurement of criteria parameters of analog-to-digital converters and monitoring of their changes during the radiation experiment

20. Network attacks main danger indicators formation in Internal Affairs Bodies automated systems

21. The use of microelectronics radiation behavior asphysical uncloned function to find counterfeit

22. The influence of high ionizing dose rate on CMOS IC radiation hardness used in da-ta transmission elements

23. The knowledge graph concept of decision support system in preliminary investigation

24. Evaluating CMOS chip sensitivity parameters to single event upsets under influence of neutrons by the burst generation rate function

25. Information security of state information systems

26. Algorithm for matching physical and logical addressing in memory chips using laser sources

27. The methodology for critical processes identifying at information infrastructure facilities

28. Simulation of organizational protection of a protected object based on the theory of automata and Petri nets

29. Approaches to online handwritten signature verification

30. Trust Model for the Russian Federation Digital Economy

31. On the issue of categorization of objects of critical information infrastructure of seaports

32. Integrity monitoring of virtual machines components based on the KVM hypervisor

33. Development of secure architectures for process control systems

34. Assessment of probabilities of computer attacks based on function

35. Аnalysis of the process of functioning of subsystems of access control systems to protect information from unauthorized access and basic aspects their perfection in automated systems of internal affairs bodies

36. Software implementation of a DLP-system module for monitoring and controlling corporate network traffic using machine learning

37. Single event effects qualificatoin of integrated circuits

38. Analysis and classification of the main threats to information security of automated systems at the objects of informatization of internal affairs bodies

39. Approach to steganography storage in removable media file system

40. Hardness assurance levels and requirements for single event effects testing of integrated circuits

41. Terms and definitions base development for counterfeit electronics test for critical information infrastructure objects

42. A methodological approach to identifying destructive information actions on a distributed process control system

43. Models and algorithms of privacy-preserving machine learning

44. Approaches to measuring the risk of cyberattacks in remote banking services of Russia

45. Speech-like signal system modeling and its application in the field of security, communication and control access

46. Algorithm for creation of automated systems in protected performance

47. Distributed ledger as a tool to ensure trust among business process participants

48. Security of significant objects of critical information infrastructure

49. The Okinawa Charter and the Congress of the United Nations: cybercrime countering issues

50. Development of EPC-Models of threats to information security of the automated process control system

Catalog

Books, media, physical & digital resources