Bezopasnost informacionnyh tehnology最新文献

筛选
英文 中文
Development of recommendations for reducing the energy of the signal emitted by the LVDS interface 为降低 LVDS 接口发出的信号能量提出建议
Bezopasnost informacionnyh tehnology Pub Date : 2024-06-01 DOI: 10.26583/bit.2024.2.12
Andrey A. Belavin, Daria A. Iutina, Ksenia A. Shalova, Rodion Ya. Pantsir
{"title":"Development of recommendations for reducing the energy of the signal emitted by the LVDS interface","authors":"Andrey A. Belavin, Daria A. Iutina, Ksenia A. Shalova, Rodion Ya. Pantsir","doi":"10.26583/bit.2024.2.12","DOIUrl":"https://doi.org/10.26583/bit.2024.2.12","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"60 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141391294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The methodology of functional modeling as a tool for formalizing the process of intercepting computer information through spurious electromagnetic radiation and interference 将功能建模方法作为一种工具,使通过虚假电磁辐射和干扰截获计算机信息的过程正规化
Bezopasnost informacionnyh tehnology Pub Date : 2024-06-01 DOI: 10.26583/bit.2024.2.11
Aleksey A. Petlevanny, Tatyana V. Meshcheryakova, Aleksandr I. Boronenkov, Vadim. I. Spivak, Varvara A. Vladychenskaia
{"title":"The methodology of functional modeling as a tool for formalizing the process of intercepting computer information through spurious electromagnetic radiation and interference","authors":"Aleksey A. Petlevanny, Tatyana V. Meshcheryakova, Aleksandr I. Boronenkov, Vadim. I. Spivak, Varvara A. Vladychenskaia","doi":"10.26583/bit.2024.2.11","DOIUrl":"https://doi.org/10.26583/bit.2024.2.11","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141406611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The choice of the way to counteract leakage of information due to side electromagnetic radiation 选择防止侧向电磁辐射造成信息泄露的方法
Bezopasnost informacionnyh tehnology Pub Date : 2024-03-01 DOI: 10.26583/bit.2024.1.09
Sergey V. Ryzhenko
{"title":"The choice of the way to counteract leakage of information due to side electromagnetic radiation","authors":"Sergey V. Ryzhenko","doi":"10.26583/bit.2024.1.09","DOIUrl":"https://doi.org/10.26583/bit.2024.1.09","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140276851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the training of specialists to ensure the security of the information infrastructure of the internal affairs authorities 加强对专家的培训,确保内政当局信息基础设施的安全
Bezopasnost informacionnyh tehnology Pub Date : 2024-03-01 DOI: 10.26583/bit.2024.1.06
V. S. Gorbatov, Aleksandr S. Erdniev
{"title":"Improving the training of specialists to ensure the security of the information infrastructure of the internal affairs authorities","authors":"V. S. Gorbatov, Aleksandr S. Erdniev","doi":"10.26583/bit.2024.1.06","DOIUrl":"https://doi.org/10.26583/bit.2024.1.06","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"27 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140272307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The quality assurance system of the trusted Microelectronic production 值得信赖的微电子生产质量保证体系
Bezopasnost informacionnyh tehnology Pub Date : 2024-03-01 DOI: 10.26583/bit.2024.1.01
Iuliia M. Moskovskaia, Andrey N. Denisov, A. Y. Nikiforov
{"title":"The quality assurance system of the trusted Microelectronic production","authors":"Iuliia M. Moskovskaia, Andrey N. Denisov, A. Y. Nikiforov","doi":"10.26583/bit.2024.1.01","DOIUrl":"https://doi.org/10.26583/bit.2024.1.01","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"251 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Models and approaches to attack surface analysis for fuzz testing of the Linux kernel 用于 Linux 内核模糊测试的攻击面分析模型和方法
Bezopasnost informacionnyh tehnology Pub Date : 2024-03-01 DOI: 10.26583/bit.2024.1.08
P.A. Teplyuk, A. Yakunin
{"title":"Models and approaches to attack surface analysis for fuzz testing of the Linux kernel","authors":"P.A. Teplyuk, A. Yakunin","doi":"10.26583/bit.2024.1.08","DOIUrl":"https://doi.org/10.26583/bit.2024.1.08","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"12 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140277401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring the privacy of information in distributed ledger systems with zero-knowledge proofs 用零知识证明确保分布式账本系统中的信息隐私
Bezopasnost informacionnyh tehnology Pub Date : 2024-03-01 DOI: 10.26583/bit.2024.1.04
S. Zapechnikov, Anatoly Yu. Konkin
{"title":"Ensuring the privacy of information in distributed ledger systems with zero-knowledge proofs","authors":"S. Zapechnikov, Anatoly Yu. Konkin","doi":"10.26583/bit.2024.1.04","DOIUrl":"https://doi.org/10.26583/bit.2024.1.04","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"81 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140278959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity concepts’ taxonomy 网络安全概念分类法
Bezopasnost informacionnyh tehnology Pub Date : 2024-03-01 DOI: 10.26583/bit.2024.1.10
Alexander I. Tolstoy
{"title":"Cybersecurity concepts’ taxonomy","authors":"Alexander I. Tolstoy","doi":"10.26583/bit.2024.1.10","DOIUrl":"https://doi.org/10.26583/bit.2024.1.10","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"15 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140268733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The creation of domestic software repositories is a priority task to ensure the technological independence of critical information infrastructure 建立国内软件库是确保关键信息基础设施技术独立性的一项优先任务
Bezopasnost informacionnyh tehnology Pub Date : 2024-03-01 DOI: 10.26583/bit.2024.1.05
Vladislav V. Zezyulin
{"title":"The creation of domestic software repositories is a priority task to ensure the technological independence of critical information infrastructure","authors":"Vladislav V. Zezyulin","doi":"10.26583/bit.2024.1.05","DOIUrl":"https://doi.org/10.26583/bit.2024.1.05","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"226 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140278679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of the prospects for using fitness bracelets as a source of biometric information when synthesizing the biosignature of an important document 分析在合成重要文件生物特征时使用健身手环作为生物识别信息源的前景
Bezopasnost informacionnyh tehnology Pub Date : 2024-03-01 DOI: 10.26583/bit.2024.1.03
A. Alyushin, S. Dvoryankin
{"title":"Analysis of the prospects for using fitness bracelets as a source of biometric information when synthesizing the biosignature of an important document","authors":"A. Alyushin, S. Dvoryankin","doi":"10.26583/bit.2024.1.03","DOIUrl":"https://doi.org/10.26583/bit.2024.1.03","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"467 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140283012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信