Search by keyword: "security"
Intelligent systems in the information engineering and technical protection
Authors: Yadykin N.V. | Published: 19.12.2023 |
Published in issue: #11(88)/2023 | |
DOI: DOI: 10.18698/2541-8009-2023-11-953 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information protection, security, intelligent systems, information engineering and technical protection, technical security systems, security alarm system, fire alarm systems, video surveillance systems, access control and management systems, technical security equipment, integrated technical security system |
The application of facial recognition technology in crime detection, investigation and prevention
Authors: Lyadovskaya N.I., Pisanova V.A. | Published: 15.12.2022 |
Published in issue: #11(76)/2022 | |
DOI: DOI: 10.18698/2541-8009-2022-11-842 | |
Category: Jurisprudence | Chapter: Civil and business law | |
Keywords: identification, biometric parameters, face identification, new technologies, facial recognition technology, facial recognition, automatic recognition, neural networks, security, forensics |
Process of developing a TCP server for secure communication between an application and a database
Authors: Marchenko A.V., Vanin A.V. | Published: 29.07.2020 |
Published in issue: #7(48)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-7-626 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: TCP server, security, exchange, data, database, application, request, efficiency, development, programming, interaction |
The role of authentication in the IoT systems
Authors: Bratko D.V., Berezin V.S. | Published: 30.01.2020 |
Published in issue: #1(42)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-1-570 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: Internet of things, authentication, Smart Home, threat model, security, information and communication technologies, automation, cloud platform |
The ways of noise-immunity improvement in the radio channels
Authors: Filatov V.I., Borukaeva A.O., Berdikov P.G. | Published: 27.03.2019 |
Published in issue: #3(32)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-3-455 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: data transfer, radio communication, code division, modulation, bandwidth, security, noise immunity, signal-to-noise ratio |
Ensuring local area network security for small businesses
Authors: Zhukova D.E. | Published: 06.12.2016 |
Published in issue: #3(3)/2016 | |
DOI: DOI: 10.18698/2541-8009-2016-3-28 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: security, local area network, user, intruder, attack |