Problems of active protection of information from leakage through vibroacoustic channels
Properties of different materials in the propagation of vibration signals in them, at different distances from the source of vibrations are investigated. The measurements have been performed for glass, concrete, plastic, wood and metal. The results of the experiment have shown that the smallest atte...
Saved in:
| Date: | 2016 |
|---|---|
| Main Authors: | Kataiev, V. С., Grycak, A. V., Leontiev, V. О., Liahovchenko, N. V. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2016
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/101220 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012)
by: Lande, D. V.
Published: (2012)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016)
by: Mаtоv, O. Y., et al.
Published: (2016)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Development of Algorithms for Accelerated Computation of Elements of Recurrent Sequences for Cryptographic Purposes
by: Iaremchuk, Iu. E.
Published: (2013)
by: Iaremchuk, Iu. E.
Published: (2013)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Researches of characteristics of domestic radiopaque fabrics H1, H2 and H3 with the use of different combinations of theirs
by: Yaremchuk, Yu. E., et al.
Published: (2016)
by: Yaremchuk, Yu. E., et al.
Published: (2016)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Information systems for observation of marine aquatories and adjacent areas using aerospace technologies
by: Volynets, Taras, et al.
Published: (2025)
by: Volynets, Taras, et al.
Published: (2025)
Information and mathematical model of quantum communication channel state control processes
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
Information technologies of simulation of beam structures using multispectral spacecraft materials
by: Trysnyuk, Vasyl M., et al.
Published: (2023)
by: Trysnyuk, Vasyl M., et al.
Published: (2023)
Cybersecurity maturity models for cybersecurity assessment in critical infrastructure
by: Khudyntsev, Mykola M., et al.
Published: (2024)
by: Khudyntsev, Mykola M., et al.
Published: (2024)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Method of processing information about the state of the environment based on data obtained through a service-oriented network
by: Trofymchuk, Oleksandr M., et al.
Published: (2023)
by: Trofymchuk, Oleksandr M., et al.
Published: (2023)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Automation of standardized cyber insurance processes
by: Khudyntsev, Mykola, et al.
Published: (2025)
by: Khudyntsev, Mykola, et al.
Published: (2025)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Adaptation of Distributed Information Infrastructures for Government Bodies Interaction
by: Khramova, I. О.
Published: (2012)
by: Khramova, I. О.
Published: (2012)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Calculated spectra of information leakage signals from monitor screens on rare-crystal structures
by: Євграфов, Д. В., et al.
Published: (2021)
by: Євграфов, Д. В., et al.
Published: (2021)
Authentication Method of Interaction Parties Based on Reccurent Sequences
by: Yaremchuk, Yu. Е.
Published: (2013)
by: Yaremchuk, Yu. Е.
Published: (2013)
Method of Digital Signature Producing and Verification Based on Recurrent Sequences
by: Iaremchuk, Iu. Е.
Published: (2013)
by: Iaremchuk, Iu. Е.
Published: (2013)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Information systems of deciphering images using aerospace technologies
by: Maruschak, Vasyl M., et al.
Published: (2024)
by: Maruschak, Vasyl M., et al.
Published: (2024)
Investigation of combinational characteristics of domestic radio-stable fabrics M1, M2 and M3
by: Yaremchuk, Yu. E., et al.
Published: (2015)
by: Yaremchuk, Yu. E., et al.
Published: (2015)
Mathematical model of the distribution of radio monitoring resources for observation of satellite communication channels using neural networks
by: Trysnyuk, Vasyl, et al.
Published: (2025)
by: Trysnyuk, Vasyl, et al.
Published: (2025)
Information systems of observation of marine waters and adjacent areas using remotely piloted aircraft
by: Trysnyuk, Taras V., et al.
Published: (2024)
by: Trysnyuk, Taras V., et al.
Published: (2024)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Improvement of the method of semiotic analysis of materials for detection of informational-psychological impact
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
by: Trofymchuk, Oleksandr, et al.
Published: (2025)
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)
by: Volynets, O. Yu., et al.
Published: (2019)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Ontology based systemazing of the science information devoted to waste utilizing by methanogenesys
by: Shapovalov, Ye.B., et al.
Published: (2018)
by: Shapovalov, Ye.B., et al.
Published: (2018)
Information technologies for environmental monitoring of landfills using remotely piloted aircraft
by: Shevchuk, Oleksandr
Published: (2025)
by: Shevchuk, Oleksandr
Published: (2025)
Detection of information sources distributing fake information inside global internet network
by: Soboliev, A. М.
Published: (2019)
by: Soboliev, A. М.
Published: (2019)
Building of a System for Monitoring, Adaptive Aggregation and Generalization of Information
by: Dodonov, A. G., et al.
Published: (2013)
by: Dodonov, A. G., et al.
Published: (2013)
Technology for ensuring the survivability of territorially distributed information computer systems in a unified information space
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Application of convolutional neural networks for improving the accuracy of multistatic localization of radio emission sources
by: Dziuba, Volodymyr
Published: (2025)
by: Dziuba, Volodymyr
Published: (2025)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Similar Items
-
Methods to Improve of the Information Component Survivabilityof Corporate Information-Analytical Systems
by: Lande, D. V.
Published: (2012) -
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019) -
Protection of information objects from intentional collisions of inspection characteristics in error-correcting codes
by: Mаtоv, O. Y., et al.
Published: (2016) -
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023) -
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)