检索

标题
作者
BASES OF INFORMATION SECURITY IN DEVELOPING SITES
Yuldashev T., Sheptunov S.
WEB APPLICATION OF ESTIMATING PROTECTION SYSTEM EFFECTIVENESS OF THE ENTERPRISE
Bakhareva N., Fedorov S.
MODERN TECHNIQUES ARE USED TO EVALUATE THREATE AND VULNERABILITIES INFORMATION SYSTEMS
Gubareva O., Pugin V.
Expert system applications for industryspecifc information security challenges
Kireeva N., Pozdnyak I., Filippov N.
HIERARCHICAL STOCHASTIC MODEL FOR MONITORING OF TREAT TO INFORMATION SECURITY OF INFORMATION SYSTEM
Gubareva O., Osipov O., Pugin V.
THE APPLICATION OF MATHEMATICAL PROGRAMMING FOR SOLVING THE PROBLEM OF DESIGNING THE PROTECTION SYSTEM OF THE OBJECT OF CRITICAL INFRASTRUCTURE
Kartak V., Bashmakov N.
Enterprise Data Processing Networks: Authentication and Identifcation Procedures
Vasilenko K., Zolkin A., Abramov N., Kurganov D.
MODELING IS SECURE OF TELECOMMUNICATION CHANNELS WITH USING VIRTUALIZATION
Vasin N., Irbakhtin A.
MODERN ACHIEVEMENTS INTO CRYPTO-BIOMETRIC PROTECTION OF INFORMATION BASED ON HANDWRITING
Bayanov B.
Features of Flash Drives Information Security
Vasilenko K., Zolkin A., Abramov N., Kurganov D.
METHOD FOR MANAGEMENT OF INFORMATION SECURITY IN CORPORATE NETWORKS
Anikin I.
IDENTIFICATION OF DOS ATTACKS BY ANALYSIS OF SOME STATISTICAL CHARACTERISTICS OF TRAFFIC
Pozdnyak I., Plavan A.
A BRIEF OVERVIEW OF DATA HIDING METHODS IN DIGITAL IMAGES
Verdiyev S., Naghiyeva A.
1 - 13 的 13 信息

检索提示:

  • 检索的名词区分大小写
  • 常用字词将被忽略
  • 默认情况下只有在查询结果满足所有检索词才返回(例如,隐含AND)
  • 使用OR结合多个检索词,便于查找含有这些检索词的文章,例如education OR research
  • 使用括号来创建更复杂的查询; 例如:archive ((journal OR conference) NOT theses)
  • 使用引号检索一个完整的词组; 例如: "open access publishing"
  • 使用-或者NOT排除一个检索词; 例如:online -politics or online NOT politics
  • 在检索词里使用 *作为通配符匹配任何字符序列; 例如., soci* morality 将符合含有 "sociological" or "societal"的词语
##common.cookie##