scroll to top
0

Mobile Menu

Header Layout

EBSCO Auth Banner

Let's find your institution. Click here.

Page title

Advanced Search Results For "T58.5-58.64"

1 - 10 of 40,548 results for
 "T58.5-58.64"
Results per page:

Ransomware detection based on machine learning models and Event Tracing for Windows

Publication Type:Academic Journal

Source(s):Bezopasnostʹ Informacionnyh Tehnologij, Vol 29, Iss 3, Pp 82-93 (2022)

Abstract:Nowadays ransomware cyberattacks are alarmingly increasing. Ransomware is a form of malicious software that locks users’ files by modifying it or it’s parts. To get the files back the users are supposed to pay ransom. Ransomware are using different typ...

View details

Socio-psychological techniques of information warfare

Publication Type:Academic Journal

Source(s):Bezopasnostʹ Informacionnyh Tehnologij, Vol 29, Iss 3, Pp 18-37 (2022)

Abstract:Since the end of the XX century, information technologies have begun to actively penetrate into all spheres of society, which led it to a new stage, so-called "informational". In the new society, information has become the main element of people's exis...

View details

EDITOR-IN-CHIEF'S COLUMN

Publication Type:Academic Journal

Source(s):Bezopasnostʹ Informacionnyh Tehnologij, Vol 29, Iss 3, Pp 5-10 (2022)

View details

On the application of the vulnerability analysis method of the technological process of the production facility to ensure the information security of the automated process control system, taking into account the interrelation of components

Publication Type:Academic Journal

Source(s):Bezopasnostʹ Informacionnyh Tehnologij, Vol 29, Iss 3, Pp 38-52 (2022)

Abstract:The purpose of the paper is to analyze the vulnerability of systems that ensure the processes of vital activity of an object of the fuel and energy complex. The application of the shifted ideal method, as well as the method of reduced hierarchy analysi...

View details

Methodological aspects of penetration testing automation for significant objects of critical information infrastructure

Publication Type:Academic Journal

Source(s):Bezopasnostʹ Informacionnyh Tehnologij, Vol 29, Iss 3, Pp 94-104 (2022)

Abstract:The paper deals with the existing regulatory and methodological framework that determines the importance of the problem of penetration testing as well as the main methods of testing significant objects of critical information infrastructure (CII). Ensu...

View details

Hiding data in blocks of Oracle Database

Publication Type:Academic Journal

Source(s):Bezopasnostʹ Informacionnyh Tehnologij, Vol 29, Iss 3, Pp 62-71 (2022)

Abstract:In this paper, we explore the possibility of storing a hidden message in the physical data structures of the Oracle Database Management System (DBMS). We consider data blocks, the fundamental Oracle Database storage units for table data and other objec...

View details

THERE IS AN OPINION: "What could be the program for creating domestic CAD systems?"

Publication Type:Academic Journal

Source(s):Bezopasnostʹ Informacionnyh Tehnologij, Vol 29, Iss 3, Pp 11-17 (2022)

Abstract:As already announced, we are opening a new regular column "There is an opinion", and as a first experience, we invited Maxim Gorbunov, Ph.D., Associate professor of the MEPhI National Research Institute, who, in collaboration with Ph.D. Danilov Igor, w...

View details

Investigating the possibility of increasing the resilience to attack of the differential energy watermarking embedding method

Publication Type:Academic Journal

Source(s):Bezopasnostʹ Informacionnyh Tehnologij, Vol 29, Iss 3, Pp 72-81 (2022)

Abstract:The aim of this paper is to investigate the possibility of increasing the robustness of digital watermark embedding by the differential energy watermarking (DEW) embedding method to static attacks: median filter, Gaussian filter, threshold rounding, no...

View details

Methods of image transformation for person authentication using face thermographic image

Publication Type:Academic Journal

Source(s):Bezopasnostʹ Informacionnyh Tehnologij, Vol 29, Iss 3, Pp 53-61 (2022)

Abstract:The purpose of the paper is to study the holistic image transformation methods for person's identity authentication from a thermographic image of faces. Within this study the datasets of images of faces in the far infrared range (LWIR) have been collec...

View details

A revised application of cognitive presence automatic classifiers for MOOCs: a new set of indicators revealed?

Publication Type:Academic Journal

Source(s):International Journal of Educational Technology in Higher Education, Vol 19, Iss 1, Pp 1-21 (2022)

Abstract:Abstract Automatic analysis of the myriad discussion messages in large online courses can support effective educator-learner interaction at scale. Robust classifiers are an essential foundation for the use of automatic analysis of cognitive presence in...

View details

banner_970x250 (970x250)

sponsored