Showing 201 - 220 results of 332 for search '"information security"', query time: 0.09s Refine Results
  1. 201

    Design, Simulation, and Experimental Verification of a Destruction Mechanism of Transient Electronic Devices by Yu Xiao, Zhengyuan Zhang, Xiyi Liao, Feiyu Jiang, Yan Wang

    Published 2020-01-01
    “…To quickly destroy electronic devices and ensure information security, a destruction mechanism of transient electronic devices was designed in this paper. …”
    Get full text
    Article
  2. 202
  3. 203
  4. 204
  5. 205

    MODERN CYBERNETIC TERRORISM AND HIS SOCIAL CONSEQUENCES by N. Grigoriev, E. Rodyukov

    Published 2016-05-01
    “…Given that policy now covers all spheres of public life and, therefore, increasing the problem of information security of society in General and each person in particular. …”
    Get full text
    Article
  6. 206
  7. 207

    INFORMATION SUPPORT FOR THE TRANSPORT AND LOGISTICS COMPANY by T. Bogdanova, K. Kuznetsov

    Published 2016-04-01
    “…The analysis of the major databases characterizing the state of the external and internal environments of transport and logistics companies, which allowed to formulate the problems and trends of development of information security. Examples of public information databases and their impact on the performance of the transport and logistics companies. …”
    Get full text
    Article
  8. 208
  9. 209
  10. 210
  11. 211

    Application of fuzzy modeling in the evaluation of crisis state of enterprises by M. N. Belousova, A. A. Dashkov

    Published 2019-04-01
    “…In the model of a fuzzy assessment of the crisis state of enterprises, the following input linguistic variables have been highlighted: the relative level of financial status, the probability of bankruptcy, the level of information security, the level of innovation potential. …”
    Get full text
    Article
  12. 212
  13. 213

    التخزین السحابی للبیانات وأمن المعلومات " دراسة تقییمیة by د. ممدوح علی محمود

    Published 2016-10-01
    “…The study recommended that more research work shouldbe undertaken in the field of cloud storage, and the necessity of activating cloudstorage –taking the full information security precautions- in all institutions.…”
    Get full text
    Article
  14. 214
  15. 215
  16. 216

    Random Emission and Control of Whispering Gallery Mode Using Flexible Optical Fiber by Bingyang Cao, Zhen He, Weili Zhang

    Published 2025-01-01
    “…Additionally, the application of this laser in information security encryption is demonstrated and explored.…”
    Get full text
    Article
  17. 217
  18. 218
  19. 219

    Research Developments in Generative Adversarial Networks for Image Restoration and Communication by Zhou Peng

    Published 2025-01-01
    “…The GAN model is also widely used in the field of communication and information security. It proposes an End-to-End(E-to-E) communication encryption system based on Deep Convolutional GAN (DCGAN) to solve the secure transmission problem in wireless communication systems based on E-to-E learning. …”
    Get full text
    Article
  20. 220

    Global Information Management Model and Identification Method Based on Deep Reinforcement Learning by RuiLe Lan, XiJia He

    Published 2021-01-01
    “…Therefore, the research on global information management models and identification methods in this article is based on the consideration of global information security and is to create a good global environment. …”
    Get full text
    Article