Bezopasnost informacionnyh tehnology最新文献

筛选
英文 中文
Managing wireless communication security for smart home cyber-physical systems 管理智能家居网络物理系统的无线通信安全
Bezopasnost informacionnyh tehnology Pub Date : 2024-03-01 DOI: 10.26583/bit.2024.1.02
Pavel V. Nekrasov, Alexander M. Zharikov, D.A Kozin
{"title":"Managing wireless communication security for smart home cyber-physical systems","authors":"Pavel V. Nekrasov, Alexander M. Zharikov, D.A Kozin","doi":"10.26583/bit.2024.1.02","DOIUrl":"https://doi.org/10.26583/bit.2024.1.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"377 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140275233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring feature set for building a digital user profile of remote connections (based on firewall data) 探索建立远程连接数字用户档案的功能集(基于防火墙数据)
Bezopasnost informacionnyh tehnology Pub Date : 2024-03-01 DOI: 10.26583/bit.2024.1.07
Aleksandr Y. Dubinin
{"title":"Exploring feature set for building a digital user profile of remote connections (based on firewall data)","authors":"Aleksandr Y. Dubinin","doi":"10.26583/bit.2024.1.07","DOIUrl":"https://doi.org/10.26583/bit.2024.1.07","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technological platform for the implementation of the cybersecurity network concept ("Cybersecurity Mesh") 实施网络安全网络概念("网络安全网格")的技术平台
Bezopasnost informacionnyh tehnology Pub Date : 2023-12-01 DOI: 10.26583/bit.2023.4.01
V. Gorbatov, I. Zhukov, Vladislav V. Kravchenko, D. Pravikov
{"title":"Technological platform for the implementation of the cybersecurity network concept (\"Cybersecurity Mesh\")","authors":"V. Gorbatov, I. Zhukov, Vladislav V. Kravchenko, D. Pravikov","doi":"10.26583/bit.2023.4.01","DOIUrl":"https://doi.org/10.26583/bit.2023.4.01","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":" March","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138611127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concepts and criteria for assessing the technological independence and security of critical information infrastructure facilities 评估重要信息基础设施的技术独立性和安全性的概念和标准
Bezopasnost informacionnyh tehnology Pub Date : 2023-12-01 DOI: 10.26583/bit.2023.4.02
B. N. Krivoshein, Ivan A. Pokrovsky
{"title":"Concepts and criteria for assessing the technological independence and security of critical information infrastructure facilities","authors":"B. N. Krivoshein, Ivan A. Pokrovsky","doi":"10.26583/bit.2023.4.02","DOIUrl":"https://doi.org/10.26583/bit.2023.4.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"5 20","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138625555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The possibility of improving procedures for quantitative threat assessment of unauthorized access to information of critical information infrastructure facilities 改进对未经授权访问重要信息基础设施的信息进行定量威胁评估的程序的可能性
Bezopasnost informacionnyh tehnology Pub Date : 2023-12-01 DOI: 10.26583/bit.2023.4.03
S. Skryl', Anastasiya A. Itskova, Evgeny V. Khasin
{"title":"The possibility of improving procedures for quantitative threat assessment of unauthorized access to information of critical information infrastructure facilities","authors":"S. Skryl', Anastasiya A. Itskova, Evgeny V. Khasin","doi":"10.26583/bit.2023.4.03","DOIUrl":"https://doi.org/10.26583/bit.2023.4.03","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"22 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138627042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal choice of information security in automated systems via Markov cyber-attack models 通过马尔可夫网络攻击模型优化自动化系统中的信息安全选择
Bezopasnost informacionnyh tehnology Pub Date : 2023-12-01 DOI: 10.26583/bit.2023.4.06
E. Trapeznikov
{"title":"Optimal choice of information security in automated systems via Markov cyber-attack models","authors":"E. Trapeznikov","doi":"10.26583/bit.2023.4.06","DOIUrl":"https://doi.org/10.26583/bit.2023.4.06","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":" 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138612788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noise diodes as a source of entropy for hardware random number generators 作为硬件随机数生成器熵源的噪声二极管
Bezopasnost informacionnyh tehnology Pub Date : 2023-12-01 DOI: 10.26583/bit.2023.4.09
Dmitry O. Petrov, Viktor V. Busliuk, Stanislav S. Derechennik, Viktor A. Emeljanov
{"title":"Noise diodes as a source of entropy for hardware random number generators","authors":"Dmitry O. Petrov, Viktor V. Busliuk, Stanislav S. Derechennik, Viktor A. Emeljanov","doi":"10.26583/bit.2023.4.09","DOIUrl":"https://doi.org/10.26583/bit.2023.4.09","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":" 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138616730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operating System Influence on VLSI Radiation Resistance 操作系统对超大规模集成电路抗辐射能力的影响
Bezopasnost informacionnyh tehnology Pub Date : 2023-12-01 DOI: 10.26583/bit.2023.4.08
M. A. Rogovaia, D.S. Kostyuchenko, Ilya O. Loskutov, A. Ulanova
{"title":"Operating System Influence on VLSI Radiation Resistance","authors":"M. A. Rogovaia, D.S. Kostyuchenko, Ilya O. Loskutov, A. Ulanova","doi":"10.26583/bit.2023.4.08","DOIUrl":"https://doi.org/10.26583/bit.2023.4.08","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"61 3‐4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138623682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Trusted UHF Receiver for Radio Frequency Identification of Critical Infrastructure Objects 用于关键基础设施目标射频识别的可信超高频接收器
Bezopasnost informacionnyh tehnology Pub Date : 2023-12-01 DOI: 10.26583/bit.2023.4.07
D. Sotskov, Alexey V. Zubakov, Nikolay A. Usachev, Alexander V. Ermakov, A. Y. Nikiforov
{"title":"The Trusted UHF Receiver for Radio Frequency Identification of Critical Infrastructure Objects","authors":"D. Sotskov, Alexey V. Zubakov, Nikolay A. Usachev, Alexander V. Ermakov, A. Y. Nikiforov","doi":"10.26583/bit.2023.4.07","DOIUrl":"https://doi.org/10.26583/bit.2023.4.07","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":" 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138617849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trusted and controlled design route complex-functional VLSI using foreign and domestic CAD systems 使用国外和国内 CAD 系统进行可信和可控的复杂功能 VLSI 设计路线
Bezopasnost informacionnyh tehnology Pub Date : 2023-12-01 DOI: 10.26583/bit.2023.4.05
Sergey G. Bobkov, B. E. Evlampiev
{"title":"Trusted and controlled design route complex-functional VLSI using foreign and domestic CAD systems","authors":"Sergey G. Bobkov, B. E. Evlampiev","doi":"10.26583/bit.2023.4.05","DOIUrl":"https://doi.org/10.26583/bit.2023.4.05","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"112 49","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138608543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信