-
41
Methodology for determining actual threats to information security in medical information system
Published 2021-11-01“…Its use also makes it possible to assess the relevance of information security threats for MIS that do not have qualified specialists in the field of information security in the staff of a medical institution, which is relevant for a large number of medical institutions. …”
Get full text
Article -
42
Analysis of Russian Federation Foreign Policy in the Field of International Information Security
Published 2014-12-01Subjects: Get full text
Article -
43
Access to Network Login by Three-Factor Authentication for Effective Information Security
Published 2016-01-01Get full text
Article -
44
Research on the game of information security investment based on the Gordon-Loeb model
Published 2018-02-01Subjects: “…information security investment…”
Get full text
Article -
45
Information security of minors: individual subjects of the Russian Federation organization experience
Published 2023-02-01Subjects: “…information security…”
Get full text
Article -
46
Trends, challenges and solutions of digital information security in Central and Eastern Europe
Published 2024-06-01Subjects: “…digital information security…”
Get full text
Article -
47
An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations.
Published 2023“…The study aims to examine information security managerial practices in organisations. …”
Get full text
Article -
48
Advanced Approach to Information Security Management System Model for Industrial Control System
Published 2014-01-01“…Therefore, a new information security management system based on confidentiality, integrity, and availability as well as safety is required for ICSs. …”
Get full text
Article -
49
Relevant Problems of Implementing State Policy in the Field of Ensuring Information Security of Ukraine
Published 2021-07-01Subjects: “…information security…”
Get full text
Article -
50
Federated Reinforcement Learning in Stock Trading Execution: The FPPO Algorithm for Information Security
Published 2025-01-01Get full text
Article -
51
Legal support for information security of legal entities under Lithuanian and Ukrainian legislation
Published 2023-12-01Subjects: “…information security…”
Get full text
Article -
52
Evolution entropy risk assessment of ERP information security based on the business process
Published 2012-09-01Subjects: Get full text
Article -
53
Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus
Published 2021-10-01Subjects: Get full text
Article -
54
Application of Hybrid Transform Domain Digital Watermarking in Power System Information Security
Published 2013-11-01Get full text
Article -
55
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
Published 2014-06-01Subjects: “…information security…”
Get full text
Article -
56
Design of the Monitoring System for Communication Satellite Information Security Based on Spaceborne Network Probe
Published 2023-06-01Subjects: Get full text
Article -
57
Practice analysis of domestic and foreign industry benchmarking enterprises in the field of network and information security
Published 2020-11-01Subjects: Get full text
Article -
58
-
59
ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONS
Published 2024-09-01Subjects: Get full text
Article -
60
Peculiarities of legal regulation of activities of the National Police of Ukraine in the field of ensuring information security in Ukraine
Published 2020-12-01Subjects: “…information security…”
Get full text
Article