Bezopasnost informacionnyh tehnology最新文献

筛选
英文 中文
Investigation of anomalous diffusion of aluminum into silicon 铝向硅反常扩散的研究
Bezopasnost informacionnyh tehnology Pub Date : 2023-05-01 DOI: 10.26583/bit.2023.2.11
A. Bespalov, Mikhail S. Afanasyev, O. Golikova, I. Kharitonov, Alexandra A. Muravyeva
{"title":"Investigation of anomalous diffusion of aluminum into silicon","authors":"A. Bespalov, Mikhail S. Afanasyev, O. Golikova, I. Kharitonov, Alexandra A. Muravyeva","doi":"10.26583/bit.2023.2.11","DOIUrl":"https://doi.org/10.26583/bit.2023.2.11","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121138317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Integrity checking methods for smartphones with Android operating system Android智能手机的信息完整性检查方法
Bezopasnost informacionnyh tehnology Pub Date : 2023-05-01 DOI: 10.26583/bit.2023.2.12
Mikhail M. Smotryaev, Ruslan Y. Mudry, Rodion Y. Pantsyr, Daniil A. Poplavasky
{"title":"Information Integrity checking methods for smartphones with Android operating system","authors":"Mikhail M. Smotryaev, Ruslan Y. Mudry, Rodion Y. Pantsyr, Daniil A. Poplavasky","doi":"10.26583/bit.2023.2.12","DOIUrl":"https://doi.org/10.26583/bit.2023.2.12","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121411924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptual foundations for assessing the level of security of automated systems based on their vulnerability 基于脆弱性评估自动化系统安全级别的概念基础
Bezopasnost informacionnyh tehnology Pub Date : 2023-05-01 DOI: 10.26583/bit.2023.2.04
A. O. Efimov, I. Livshitz, Tatiana V. Meshcherakova, E. Rogozin
{"title":"Conceptual foundations for assessing the level of security of automated systems based on their vulnerability","authors":"A. O. Efimov, I. Livshitz, Tatiana V. Meshcherakova, E. Rogozin","doi":"10.26583/bit.2023.2.04","DOIUrl":"https://doi.org/10.26583/bit.2023.2.04","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133389762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dose dependence of the spectral characteristics of sigma-delta analog-to-digital converters σ - δ模数转换器光谱特性的剂量依赖性
Bezopasnost informacionnyh tehnology Pub Date : 2023-05-01 DOI: 10.26583/bit.2023.2.09
M.O. Kalashnikova, R. Torshin, G. Sorokoumov, A. A. Demidov, D. Boychenko
{"title":"Dose dependence of the spectral characteristics of sigma-delta analog-to-digital converters","authors":"M.O. Kalashnikova, R. Torshin, G. Sorokoumov, A. A. Demidov, D. Boychenko","doi":"10.26583/bit.2023.2.09","DOIUrl":"https://doi.org/10.26583/bit.2023.2.09","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115123189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of the possibility of machine learning for electronic equipment quality prediction 评估机器学习用于电子设备质量预测的可能性
Bezopasnost informacionnyh tehnology Pub Date : 2023-02-01 DOI: 10.26583/bit.2023.1.09
A. Kolosova, Anna S. Kameneva, Georgii G. Chukov, A. Y. Nikiforov
{"title":"Assessment of the possibility of machine learning for electronic equipment quality prediction","authors":"A. Kolosova, Anna S. Kameneva, Georgii G. Chukov, A. Y. Nikiforov","doi":"10.26583/bit.2023.1.09","DOIUrl":"https://doi.org/10.26583/bit.2023.1.09","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115704237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematics of concepts in the field of information security 信息安全领域的概念系统
Bezopasnost informacionnyh tehnology Pub Date : 2023-02-01 DOI: 10.26583/bit.2023.1.10
A. Tolstoy
{"title":"Systematics of concepts in the field of information security","authors":"A. Tolstoy","doi":"10.26583/bit.2023.1.10","DOIUrl":"https://doi.org/10.26583/bit.2023.1.10","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115480138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Balanced arbiter physical uncloneable functions 平衡仲裁者物理不可克隆功能
Bezopasnost informacionnyh tehnology Pub Date : 2023-02-01 DOI: 10.26583/bit.2023.1.07
V. Yarmolik, A. A. Ivaniuk
{"title":"Balanced arbiter physical uncloneable functions","authors":"V. Yarmolik, A. A. Ivaniuk","doi":"10.26583/bit.2023.1.07","DOIUrl":"https://doi.org/10.26583/bit.2023.1.07","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124036393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Iran’s Cyber Capabilities and Assessing Security Standards for Popular Iranian Websites 伊朗的网络能力和评估伊朗流行网站的安全标准
Bezopasnost informacionnyh tehnology Pub Date : 2023-02-01 DOI: 10.26583/bit.2023.1.04
Mohsen Abdollahzadeh Aghbolagh, A. Trufanov
{"title":"Iran’s Cyber Capabilities and Assessing Security Standards for Popular Iranian Websites","authors":"Mohsen Abdollahzadeh Aghbolagh, A. Trufanov","doi":"10.26583/bit.2023.1.04","DOIUrl":"https://doi.org/10.26583/bit.2023.1.04","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130474693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of statistical properties and cryptographic strength of random sequences obtained by an IBM quantum computer 由IBM量子计算机获得的随机序列的统计性质和密码强度的评估
Bezopasnost informacionnyh tehnology Pub Date : 2023-02-01 DOI: 10.26583/bit.2023.1.01
Mikhail A. Orlov, K. A. Nechaev, S. A. Reznichenko
{"title":"Evaluation of statistical properties and cryptographic strength of random sequences obtained by an IBM quantum computer","authors":"Mikhail A. Orlov, K. A. Nechaev, S. A. Reznichenko","doi":"10.26583/bit.2023.1.01","DOIUrl":"https://doi.org/10.26583/bit.2023.1.01","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125318571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration of the use of temporary computer system resources by anti-virus tools 探索使用临时计算机系统资源的反病毒工具
Bezopasnost informacionnyh tehnology Pub Date : 2023-02-01 DOI: 10.26583/bit.2023.1.05
A. V. Astrakhov, A. Stadnik, K. S. Skryl, I. I. Korovin, E. R. Bashaeva
{"title":"Exploration of the use of temporary computer system resources by anti-virus tools","authors":"A. V. Astrakhov, A. Stadnik, K. S. Skryl, I. I. Korovin, E. R. Bashaeva","doi":"10.26583/bit.2023.1.05","DOIUrl":"https://doi.org/10.26583/bit.2023.1.05","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132794211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信