-
21
Main threats to the state’s interests in the sphere of information security of Ukraine
Published 2024-03-01Subjects: “…information security…”
Get full text
Article -
22
The Study of Methods for Penetration Testing in Training of Information Security Specialists
Published 2016-12-01“…The article deals with issues related to the creation of modern educational virtual laboratory under cloud cluster platform OpenNebula for the training of specialists in the field of information security and computer security. The use of such laboratories allows teaching methods of penetration testing on examples of objects of different levels of difficulty, and also provides the possibility of rapid changes in infrastructure and characteristics of the objects.…”
Get full text
Article -
23
Social diagnostics of information security of digital society: methodological and regulatory aspects
Published 2020-02-01Subjects: Get full text
Article -
24
Method for Information Security Events Detection in a Cloud Signature Systems
Published 2024-06-01Subjects: Get full text
Article -
25
Methodology for determining actual threats to information security in medical information system
Published 2021-11-01“…Its use also makes it possible to assess the relevance of information security threats for MIS that do not have qualified specialists in the field of information security in the staff of a medical institution, which is relevant for a large number of medical institutions. …”
Get full text
Article -
26
Analysis of Russian Federation Foreign Policy in the Field of International Information Security
Published 2014-12-01Subjects: Get full text
Article -
27
Access to Network Login by Three-Factor Authentication for Effective Information Security
Published 2016-01-01Get full text
Article -
28
Information security of minors: individual subjects of the Russian Federation organization experience
Published 2023-02-01Subjects: “…information security…”
Get full text
Article -
29
An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations.
Published 2023“…The study aims to examine information security managerial practices in organisations. …”
Get full text
Article -
30
Advanced Approach to Information Security Management System Model for Industrial Control System
Published 2014-01-01“…Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. …”
Get full text
Article -
31
Relevant Problems of Implementing State Policy in the Field of Ensuring Information Security of Ukraine
Published 2021-07-01Subjects: “…information security…”
Get full text
Article -
32
Federated Reinforcement Learning in Stock Trading Execution: The FPPO Algorithm for Information Security
Published 2025-01-01Get full text
Article -
33
Legal support for information security of legal entities under Lithuanian and Ukrainian legislation
Published 2023-12-01Subjects: “…information security…”
Get full text
Article -
34
Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus
Published 2021-10-01Subjects: Get full text
Article -
35
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
Published 2014-06-01Subjects: “…information security…”
Get full text
Article -
36
-
37
ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONS
Published 2024-09-01Subjects: Get full text
Article -
38
Peculiarities of legal regulation of activities of the National Police of Ukraine in the field of ensuring information security in Ukraine
Published 2020-12-01Subjects: “…information security…”
Get full text
Article -
39
A study on the impact of accounting information security controls on the effectiveness of internal controls in Vietnamese enterprises
Published 2025-03-01Subjects: “…Accounting information security…”
Get full text
Article -
40
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
Published 2025-02-01“…In order to solve the problems of key redundancy, transmission and storage security and the difficulty of realizing the one-time-secret mode in image encryption algorithm, this paper proposes a cloud dynamic public key information security scheme based on elliptic curve and primitive Pythagoras. …”
Get full text
Article