-
241
Business ecosystem sustainability management
Published 2022-06-01“…The development of research in the field of sustainable development of business ecosystems is related to the consideration of information security issues for agents of the digital economy.…”
Get full text
Article -
242
-
243
THE IMPACT OF DATA SECURITY ON THE INTENTION OF VIETNAMESE CONSUMERS TO USE E-WALLETS
Published 2023-04-01“…Based on the research results, the study provides recommendations for consumers, e-wallet providers, and governmental agencies to increase awareness of and responsibility for information security among the consumers who use e-wallets.…”
Get full text
Article -
244
Quaternion Fractional Fourier Transform: Bridging Signal Processing and Probability Theory
Published 2025-01-01Get full text
Article -
245
Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks
Published 2013-06-01Get full text
Article -
246
Unknown presentation attack detection against rational attackers
Published 2021-09-01Get full text
Article -
247
Assessment of the effectiveness of management of innovative development institutions at the meso level
Published 2022-02-01“…It has concluded that the creation and development of a technological digital environment contribute to the effective interaction between various sectors of the economy and market entities, which is based on regulatory and legal regulation, ensuring information security, developing innovative infrastructure, providing highly qualified personnel in the industry.…”
Get full text
Article -
248
Information Support of Foreign Policy
Published 2015-04-01“…Modern international relations present new challenges and threats ofcross-border nature, which fall within the area of information security. This brings issues of informational influence on international policy to the fore. …”
Get full text
Article -
249
-
250
-
251
Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions)
Published 2023-03-01“…Researchers believe that a comprehensive solution to the problem of ensuring the information security of minors is impossible without coordinated actions of federal and regional authorities. …”
Get full text
Article -
252
Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment
Published 2014-01-01Get full text
Article -
253
-
254
Advancing GAN Deepfake Detection: Mixed Datasets and Comprehensive Artifact Analysis
Published 2025-01-01Get full text
Article -
255
ASSESSMENT AND ANALYSIS OF DIGITAL TRANSFORMATION OF REGIONAL ECONOMIC SYSTEMS OF THE RUSSIAN FEDERATION: METHODOLOGICAL APPROACHES AND THEIR APPROBATION
Published 2020-02-01“…A distinctive aspect of the proposed algorithm is the orientation of the developed tools to study the five main directions of digitalization, defined by the Order of the Government of the Russian Federation of July 28, 2017 (No. 1632-r): regulatory regulation, personnel for the digital economy, formation of research competencies and technological foundations, information infrastructure, information security. Based on the results of the study, the main qualitative and quantitative characteristics have been identified, that assess the development of the digital economy in the constituent entities of the Russian Federation at the present stage of development; a toolkit has been offered, that allows you to determine key areas of regional policy aimed at intensifying the processes of digitalization of business processes.…”
Get full text
Article -
256
Revealing Traces of Image Resampling and Resampling Antiforensics
Published 2017-01-01Get full text
Article -
257
Image Encryption Based on Dynamic Filtering and Bit Cuboid Operations
Published 2019-01-01“…And hence how to enhance the security of images has become a hot topic in the field of information security. However, due to some intrinsic characteristics of images, image security is still a challenging task. …”
Get full text
Article -
258
Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture
Published 2021-11-01“…Abstract SM3 hash algorithm developed by the Chinese Government is used in various fields of information security, and it is being widely used in commercial security products. …”
Get full text
Article -
259
A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications
Published 2022-01-01“…New methods and apparatuses for information security have evolved as a result of the rapid expansion of optical information processing. …”
Get full text
Article -
260
Vehicle Attribute Recognition for Normal Targets and Small Targets Based on Multitask Cascaded Network
Published 2019-01-01Get full text
Article