-
21
DLP: REDUCED RISK OF LEAKAGE OF CONFIDENTIAL INFORMATION OF THE BANK
Published 2017-11-01Subjects: “…information security…”
Get full text
Article -
22
Research on security of third-party tracking
Published 2014-09-01Subjects: “…information security…”
Get full text
Article -
23
Certificate integration management platform based on identity key
Published 2016-10-01Subjects: Get full text
Article -
24
Analysis of Russian Federation Foreign Policy in the Field of International Information Security
Published 2014-12-01Subjects: Get full text
Article -
25
-
26
Practice analysis of domestic and foreign industry benchmarking enterprises in the field of network and information security
Published 2020-11-01Subjects: Get full text
Article -
27
Evolution game model of offense-defense for network security based on system dynamics
Published 2014-01-01Subjects: “…information security…”
Get full text
Article -
28
Research on key technology of vulnerability threat classification
Published 2012-09-01Subjects: “…information security…”
Get full text
Article -
29
-
30
TPCM-based trusted PXE boot method for servers
Published 2020-12-01Subjects: “…information security…”
Get full text
Article -
31
Attention-based approach of detecting spam in social networks
Published 2020-02-01Subjects: Get full text
Article -
32
Adaptive JPEG steganography based on distortion cost updating
Published 2017-09-01Subjects: “…information security…”
Get full text
Article -
33
Study on enhancing integrity for BLP model
Published 2010-01-01Subjects: “…information security…”
Get full text
Article -
34
-
35
Research on penalty mechanism against selfish behaviors in anonymous communication system
Published 2006-01-01Subjects: “…information security…”
Get full text
Article -
36
Researcb on Network Security Monitoring Model and Associated Algoritbm in tbe Age of Big Data
Published 2014-07-01Subjects: Get full text
Article -
37
Perception technology of virtual threat for large enterprise's information security construction
Published 2016-12-01Subjects: “…information security…”
Get full text
Article -
38
Survey on privacy protection indoor positioning
Published 2023-09-01Subjects: Get full text
Article -
39
Information Security and Privacy Management in Intelligent Transportation Systems
Published 2024-04-01Subjects: “…information security management…”
Get full text
Article -
40
Main threats to the state’s interests in the sphere of information security of Ukraine
Published 2024-03-01Subjects: “…information security…”
Get full text
Article