New models and methods of information security estimates
Saved in:
| Date: | 2017 |
|---|---|
| Main Authors: | V. K. Zadiraka, A. M. Kudin |
| Format: | Article |
| Language: | English |
| Published: |
2017
|
| Series: | Cybernetics and Systems Analysis |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000782711 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
The impact of rounding error estimate quality of steganographic algorithm on its security
by: V. K. Zadiraka, et al.
Published: (2015)
by: V. K. Zadiraka, et al.
Published: (2015)
Method of noise-robust estimation of parameters of autoregressive model in frequency domain
by: V. K. Zadiraka, et al.
Published: (2021)
by: V. K. Zadiraka, et al.
Published: (2021)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Analyzing the Methods of Estimation of the Economic Security of Enterprises
by: O. O. Sosnovska, et al.
Published: (2019)
by: O. O. Sosnovska, et al.
Published: (2019)
Information-analysing method for information security risk management of information systems
by: Ye. S. Rodin
Published: (2018)
by: Ye. S. Rodin
Published: (2018)
Cyber security graph model of information resources
by: A. V. Nesterenko, et al.
Published: (2020)
by: A. V. Nesterenko, et al.
Published: (2020)
The Method of Color Formalization of the Level of Information Security Risk
by: V. M. Zvaritch, et al.
Published: (2019)
by: V. M. Zvaritch, et al.
Published: (2019)
Method of information and analytical support for information security risk management of information systems
by: Rodin, Y.S.
Published: (2019)
by: Rodin, Y.S.
Published: (2019)
Structural and functional model of the system of providing information and information- psychological security
by: A. B. Kachynskyi
Published: (2023)
by: A. B. Kachynskyi
Published: (2023)
The Methodical Principles of Controlling the Information System of Corporate Security
by: N. M. Volosnikova
Published: (2021)
by: N. M. Volosnikova
Published: (2021)
Modern person: security problems of adaptation to the new information environment
by: O. P. Dzoban, et al.
Published: (2019)
by: O. P. Dzoban, et al.
Published: (2019)
Cloud technologies: new facilities of computing cryptanalysis
by: V. K. Zadiraka, et al.
Published: (2016)
by: V. K. Zadiraka, et al.
Published: (2016)
A new method for estimation the circumferential burden distribution
by: V. I. Bolshakov, et al.
Published: (2014)
by: V. I. Bolshakov, et al.
Published: (2014)
Method of estimation of the economic security of Ukraine's rural territories
by: V. D. Zalizko, et al.
Published: (2016)
by: V. D. Zalizko, et al.
Published: (2016)
Method of estimation of the economic security of Ukraine's rural territories
by: V. D. Zalizko, et al.
Published: (2016)
by: V. D. Zalizko, et al.
Published: (2016)
The relationship between information security and cyber security
by: A. V. Tarasiuk
Published: (2019)
by: A. V. Tarasiuk
Published: (2019)
Estimates for information quantity in probability model in image encoding
by: Tyrygin, I. Ya., et al.
Published: (1995)
by: Tyrygin, I. Ya., et al.
Published: (1995)
Taxonomy of information security standards
by: Ya. Hladun, et al.
Published: (2017)
by: Ya. Hladun, et al.
Published: (2017)
New information operators in mathematical modeling (Review)
by: I. V. Serhiienko, et al.
Published: (2018)
by: I. V. Serhiienko, et al.
Published: (2018)
Standardization in information technology security
by: A. M. Fal
Published: (2017)
by: A. M. Fal
Published: (2017)
Legal supportof information security of the society
by: K. V. Zakharenko
Published: (2017)
by: K. V. Zakharenko
Published: (2017)
Legal supportof information security of the society
by: K. V. Zakharenko
Published: (2019)
by: K. V. Zakharenko
Published: (2019)
Security basic model for applied tasks of the distributed information system
by: Y. S. Rodin, et al.
Published: (2021)
by: Y. S. Rodin, et al.
Published: (2021)
Security basic model for applied tasks of the distributed information system
by: Rodin, Y.S., et al.
Published: (2021)
by: Rodin, Y.S., et al.
Published: (2021)
Security basic model for applied tasks of the distributed information system
by: Rodin, Y.S., et al.
Published: (2021)
by: Rodin, Y.S., et al.
Published: (2021)
The Dilemma of Information Security of the Individual in the Information Society
by: M. Zakirov, et al.
Published: (2022)
by: M. Zakirov, et al.
Published: (2022)
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025)
by: Koltyk, M. A.
Published: (2025)
Information security as an object of crime
by: A. V. Landina
Published: (2016)
by: A. V. Landina
Published: (2016)
Information threats and security services
by: Antonyuk, A.A., et al.
Published: (2015)
by: Antonyuk, A.A., et al.
Published: (2015)
Effective by Accuracy Algorithms for Calculation of Estimation of Frequency Characteristic of Linear Model of Control Objects with Permanent Parameters
by: V. K. Zadiraka, et al.
Published: (2013)
by: V. K. Zadiraka, et al.
Published: (2013)
Predictive estimation of mathematical models of information spreading process under uncertainty
by: O. H. Nakonechnyi, et al.
Published: (2017)
by: O. H. Nakonechnyi, et al.
Published: (2017)
Libraries and new kinds and methods of information mastering (Introduction)
by: A. Onishchenko
Published: (2017)
by: A. Onishchenko
Published: (2017)
Game theory and optimization models and methods to increase security of cyberinfrastructures
by: V. M. Horbachuk, et al.
Published: (2022)
by: V. M. Horbachuk, et al.
Published: (2022)
Classification of Information Security Threats of Automated System
by: A. B. Stepanjan, et al.
Published: (2013)
by: A. B. Stepanjan, et al.
Published: (2013)
Estimating and Forecasting the Resource-Ecological Security in the Context of Ensuring the Economic Security of Region
by: M. S. Samoilik, et al.
Published: (2018)
by: M. S. Samoilik, et al.
Published: (2018)
Creation model of threat and violations information for test object using ontology testing integrated information security system (IISS)
by: Koltiik, M.A.
Published: (2019)
by: Koltiik, M.A.
Published: (2019)
Estimation of basic algorithms for calculation of frequency characteristic of linear stationary model of controlled object on some classes of functions
by: V. K. Zadiraka, et al.
Published: (2014)
by: V. K. Zadiraka, et al.
Published: (2014)
Information security for optoelectronic ergatic system
by: Bushma, A.V.
Published: (2010)
by: Bushma, A.V.
Published: (2010)
Information security for optoelectronic ergatic system
by: A. V. Bushma
Published: (2010)
by: A. V. Bushma
Published: (2010)
Similar Items
-
The impact of rounding error estimate quality of steganographic algorithm on its security
by: V. K. Zadiraka, et al.
Published: (2015) -
Method of noise-robust estimation of parameters of autoregressive model in frequency domain
by: V. K. Zadiraka, et al.
Published: (2021) -
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014) -
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023) -
Analyzing the Methods of Estimation of the Economic Security of Enterprises
by: O. O. Sosnovska, et al.
Published: (2019)