-
201
Design, Simulation, and Experimental Verification of a Destruction Mechanism of Transient Electronic Devices
Published 2020-01-01“…To quickly destroy electronic devices and ensure information security, a destruction mechanism of transient electronic devices was designed in this paper. …”
Get full text
Article -
202
A deep learning-driven multi-layered steganographic approach for enhanced data security
Published 2025-02-01Get full text
Article -
203
Localization of multiple jamming attackers in vehicular ad hoc network
Published 2017-08-01Get full text
Article -
204
A Hybrid Human Dynamics Model on Analyzing Hotspots in Social Networks
Published 2012-01-01Get full text
Article -
205
MODERN CYBERNETIC TERRORISM AND HIS SOCIAL CONSEQUENCES
Published 2016-05-01“…Given that policy now covers all spheres of public life and, therefore, increasing the problem of information security of society in General and each person in particular. …”
Get full text
Article -
206
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
Published 2025-01-01Get full text
Article -
207
INFORMATION SUPPORT FOR THE TRANSPORT AND LOGISTICS COMPANY
Published 2016-04-01“…The analysis of the major databases characterizing the state of the external and internal environments of transport and logistics companies, which allowed to formulate the problems and trends of development of information security. Examples of public information databases and their impact on the performance of the transport and logistics companies. …”
Get full text
Article -
208
On a Parametric Mulholland-Type Inequality and Applications
Published 2019-01-01Get full text
Article -
209
-
210
Periodic Solutions of a Lotka-Volterra System with Delay and Diffusion
Published 2012-01-01Get full text
Article -
211
Application of fuzzy modeling in the evaluation of crisis state of enterprises
Published 2019-04-01“…In the model of a fuzzy assessment of the crisis state of enterprises, the following input linguistic variables have been highlighted: the relative level of financial status, the probability of bankruptcy, the level of information security, the level of innovation potential. …”
Get full text
Article -
212
Nanotechnology Role Development for COVID-19 Pandemic Management
Published 2022-01-01Get full text
Article -
213
التخزین السحابی للبیانات وأمن المعلومات " دراسة تقییمیة
Published 2016-10-01“…The study recommended that more research work shouldbe undertaken in the field of cloud storage, and the necessity of activating cloudstorage –taking the full information security precautions- in all institutions.…”
Get full text
Article -
214
-
215
An Adaptive Time-Stepping Algorithm for the Allen–Cahn Equation
Published 2022-01-01Get full text
Article -
216
Random Emission and Control of Whispering Gallery Mode Using Flexible Optical Fiber
Published 2025-01-01“…Additionally, the application of this laser in information security encryption is demonstrated and explored.…”
Get full text
Article -
217
A Discourse Coherence Analysis Method Combining Sentence Embedding and Dimension Grid
Published 2021-01-01Get full text
Article -
218
Sensor Resource Sharing Approaches in Sensor-Cloud Infrastructure
Published 2014-04-01Get full text
Article -
219
Research Developments in Generative Adversarial Networks for Image Restoration and Communication
Published 2025-01-01“…The GAN model is also widely used in the field of communication and information security. It proposes an End-to-End(E-to-E) communication encryption system based on Deep Convolutional GAN (DCGAN) to solve the secure transmission problem in wireless communication systems based on E-to-E learning. …”
Get full text
Article -
220
Global Information Management Model and Identification Method Based on Deep Reinforcement Learning
Published 2021-01-01“…Therefore, the research on global information management models and identification methods in this article is based on the consideration of global information security and is to create a good global environment. …”
Get full text
Article