Bezopasnost informacionnyh tehnology最新文献

筛选
英文 中文
Privacy-preserving machine learning based on secure four-party computations 基于安全四方计算的隐私保护机器学习
Bezopasnost informacionnyh tehnology Pub Date : 2022-06-01 DOI: 10.26583/bit.2022.2.04
S. Zapechnikov
{"title":"Privacy-preserving machine learning based on secure four-party computations","authors":"S. Zapechnikov","doi":"10.26583/bit.2022.2.04","DOIUrl":"https://doi.org/10.26583/bit.2022.2.04","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116062269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of threats to the functioning of cyber-physical systems due to the use of vulnerabilities of the wireless standard IEEE 802.11 调查由于使用无线标准IEEE 802.11漏洞而对网络物理系统功能造成的威胁
Bezopasnost informacionnyh tehnology Pub Date : 2022-06-01 DOI: 10.26583/bit.2022.2.02
A. P. Durakovskiy, Vitaly N. Tsymbal
{"title":"Investigation of threats to the functioning of cyber-physical systems due to the use of vulnerabilities of the wireless standard IEEE 802.11","authors":"A. P. Durakovskiy, Vitaly N. Tsymbal","doi":"10.26583/bit.2022.2.02","DOIUrl":"https://doi.org/10.26583/bit.2022.2.02","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"138 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128821721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of tolerance to space ionizing radiation for ReRAM and other non-volatile memory types ReRAM与其他非易失性存储器对空间电离辐射耐受性的比较分析
Bezopasnost informacionnyh tehnology Pub Date : 2022-06-01 DOI: 10.26583/bit.2022.2.08
A. Petrov, I. Shvetsov-Shilovskiy, S. Shmakov, A. Ulanova, A. Boruzdina
{"title":"Comparative analysis of tolerance to space ionizing radiation for ReRAM and other non-volatile memory types","authors":"A. Petrov, I. Shvetsov-Shilovskiy, S. Shmakov, A. Ulanova, A. Boruzdina","doi":"10.26583/bit.2022.2.08","DOIUrl":"https://doi.org/10.26583/bit.2022.2.08","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116158244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach to evaluating the effectiveness of the information security system for a distributed data transmission system 一种分布式数据传输系统信息安全系统有效性评估方法
Bezopasnost informacionnyh tehnology Pub Date : 2022-06-01 DOI: 10.26583/bit.2022.2.05
Oleg G. Evdokimov, Grigory P. Gavdan, S. A. Reznichenko
{"title":"An approach to evaluating the effectiveness of the information security system for a distributed data transmission system","authors":"Oleg G. Evdokimov, Grigory P. Gavdan, S. A. Reznichenko","doi":"10.26583/bit.2022.2.05","DOIUrl":"https://doi.org/10.26583/bit.2022.2.05","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114109028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Platform solutions for the design and development of reliable trusted electronic components 平台解决方案,设计和开发可靠可信的电子元件
Bezopasnost informacionnyh tehnology Pub Date : 2022-06-01 DOI: 10.26583/bit.2022.2.07
M. Gorbunov
{"title":"Platform solutions for the design and development of reliable trusted electronic components","authors":"M. Gorbunov","doi":"10.26583/bit.2022.2.07","DOIUrl":"https://doi.org/10.26583/bit.2022.2.07","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123782878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functional Security and an Untrusted Electronic Component Base 功能安全与不可信电子元件库
Bezopasnost informacionnyh tehnology Pub Date : 2022-06-01 DOI: 10.26583/bit.2022.2.10
Dmitry O. Smirnov
{"title":"Functional Security and an Untrusted Electronic Component Base","authors":"Dmitry O. Smirnov","doi":"10.26583/bit.2022.2.10","DOIUrl":"https://doi.org/10.26583/bit.2022.2.10","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133474385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using of asynchronous circuits to increase protection against side channels attacks 使用异步电路来增加对侧信道攻击的保护
Bezopasnost informacionnyh tehnology Pub Date : 2022-06-01 DOI: 10.26583/bit.2022.2.09
Igor A. Danilov, Pavel S. Dolotov
{"title":"Using of asynchronous circuits to increase protection against side channels attacks","authors":"Igor A. Danilov, Pavel S. Dolotov","doi":"10.26583/bit.2022.2.09","DOIUrl":"https://doi.org/10.26583/bit.2022.2.09","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131962480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indirect signs method for detecting hardware threats of technical means 间接标志法是检测硬件威胁的技术手段
Bezopasnost informacionnyh tehnology Pub Date : 2022-06-01 DOI: 10.26583/bit.2022.2.01
Anatoliy A. Chuprinov, Dmitry O. Smirnov
{"title":"Indirect signs method for detecting hardware threats of technical means","authors":"Anatoliy A. Chuprinov, Dmitry O. Smirnov","doi":"10.26583/bit.2022.2.01","DOIUrl":"https://doi.org/10.26583/bit.2022.2.01","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133793731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Test time optimization of solid-state drives and flash-memory chips during studies of the influence of TID on information preservation 在研究TID对信息保存的影响时,优化固态硬盘和闪存芯片的测试时间
Bezopasnost informacionnyh tehnology Pub Date : 2022-06-01 DOI: 10.26583/bit.2022.2.06
S. Shmakov
{"title":"Test time optimization of solid-state drives and flash-memory chips during studies of the influence of TID on information preservation","authors":"S. Shmakov","doi":"10.26583/bit.2022.2.06","DOIUrl":"https://doi.org/10.26583/bit.2022.2.06","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"919 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123051048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Soft tempest technology as an object of functional modeling 以软风暴技术为对象进行功能建模
Bezopasnost informacionnyh tehnology Pub Date : 2022-03-01 DOI: 10.26583/bit.2022.1.11
S. Skryl', E. V. Vaitc, Sergey S. Nikulin, Roman A. Tsoy, Varvara A. Antonova
{"title":"Soft tempest technology as an object of functional modeling","authors":"S. Skryl', E. V. Vaitc, Sergey S. Nikulin, Roman A. Tsoy, Varvara A. Antonova","doi":"10.26583/bit.2022.1.11","DOIUrl":"https://doi.org/10.26583/bit.2022.1.11","url":null,"abstract":"","PeriodicalId":278246,"journal":{"name":"Bezopasnost informacionnyh tehnology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123742528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信