Search by keyword: "information protection"
Intelligent systems in the information engineering and technical protection
Authors: Yadykin N.V. | Published: 19.12.2023 |
Published in issue: #11(88)/2023 | |
DOI: DOI: 10.18698/2541-8009-2023-11-953 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information protection, security, intelligent systems, information engineering and technical protection, technical security systems, security alarm system, fire alarm systems, video surveillance systems, access control and management systems, technical security equipment, integrated technical security system |
Analysis of security issues of wireless self-organizing networks based on unmanned aerial vehicles
Authors: Kulagin G.I. | Published: 19.04.2022 |
Published in issue: #3(68)/2022 | |
DOI: DOI: 10.18698/2541-8009-2022-3-779 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: wireless self-organizing networks, unmanned aerial vehicles, information security, security vulnerabilities, information security threats, attack, information protection, FANET |
Embedding a digital watermark in MP3 audio files to counter the spread of counterfeit products
Authors: Serebryakova S.A. | Published: 26.05.2020 |
Published in issue: #5(46)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-5-610 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: steganography, digital steganography, information hiding, information protection, MP3 file, algorithm, code, frame |
Review of human iris identification methods
Authors: Kandrina P.I. | Published: 23.03.2020 |
Published in issue: #3(44)/2020 | |
DOI: DOI: 10.18698/2541-8009-2020-3-587 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: mobile robot-nurse, vibration load, simulation, software, automated modeling, dynamics of a system of bodies, model of tire-road interaction, information protection, iris, biometric system, methods for identifying a person, intensity fluctuation, integral and differential operator, analysis of independent components, texture analysis |
Algorithms of searching for admissible solutions to construct the matrix of the game in the problem of choice of protection objects under the restrictions on resources
Authors: Koshman A.A. | Published: 07.05.2019 |
Published in issue: #4(33)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-4-471 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information protection, game theory, Boolean programming, game matrix, optimal strategy, object of protection, resource restriction, incomplete enumeration, decision tree |
The information security threats conditioned by incorrect password selection
Authors: Sukhorukova N.A. | Published: 15.02.2019 |
Published in issue: #2(31)/2019 | |
DOI: DOI: 10.18698/2541-8009-2019-2-444 | |
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security | |
Keywords: information protection, information security threats, password compromise, password cracking methods, password entropy, password resistance, password rating, password selection |