检索

标题
作者
A Refined Method for Analytical Modeling of the Processes of Spreading Virus Software to Assess the Security of Informatization Objects
Zavodtsev I., Borisov M., Bondarenko N., Meleshko V.
The Modeling of Processes of Design of Information Protection Systems in Financial Information Systems
Prokushev Y., Ponomarenko S., Maksimov R.
The Modeling of Processes of Design of Information Protection Systems in Critical Information Infrastructures
Prokushev Y., Ponomarenko S., Shishov N.
The modeling of information security system design processes in state information systems
Prokushev Y., Ponomarenko S., Ponomarenko S.
Conceptual model of choice of hardware and software protection
Prokushev Y., Maliy J.
Modeling Information Security Threats and Determination of Their Relevance for Information Systems of Informatization Objects of Federal Executive Authorities
Zavodtsev I., Borisov M., Bondarenko N., Meleshko V.
Using graphs to identify asset security compromises
Grineva N.
Cloud Technology Security
Bespalova N.
Determination of the weight of audit evidence by the method of point ratings in the information security audit
Voevodin V., Markina M., Markin P.
Development of a Software Package for the Implementation of the Algorithm Berlecamp – Messy on Simple Shift Registers with Linear Feedback for Students of the Discipline “Cryptography”
Sharipov R., Kassirova A.
Implementation of Secure Traffic Light Management Using a Neuromorphic Computing Base Based on Fuzzy Graphs
Volosova A., Matyukhina E., Morozov E.
1 - 11 的 11 信息

检索提示:

  • 检索的名词区分大小写
  • 常用字词将被忽略
  • 默认情况下只有在查询结果满足所有检索词才返回(例如,隐含AND)
  • 使用OR结合多个检索词,便于查找含有这些检索词的文章,例如education OR research
  • 使用括号来创建更复杂的查询; 例如:archive ((journal OR conference) NOT theses)
  • 使用引号检索一个完整的词组; 例如: "open access publishing"
  • 使用-或者NOT排除一个检索词; 例如:online -politics or online NOT politics
  • 在检索词里使用 *作为通配符匹配任何字符序列; 例如., soci* morality 将符合含有 "sociological" or "societal"的词语