Facet browsing currently unavailable
Page 3 of 212 results
Sort by: relevance publication year
Security problems and countermeasures against attacks in NFC JOURNAL ARTICLE published 2023 in Modern Information Security |
General Principles of Testing Information Security of an Enterprise JOURNAL ARTICLE published 2018 in Modern information security |
Ensuring cyber protection of a computer network object of information activity JOURNAL ARTICLE published 2021 in Modern information security |
Threat Intelligence technology and methods of its use to protect the company from cyber threats JOURNAL ARTICLE published 2021 in Modern information security |
IoT protection based on Lora Wan JOURNAL ARTICLE published 2021 in Modern information security |
Method of Organizing Real-Time Assessment of Cybersecurity Status of Critical Information Infrastructure Using Cyber-Threat Indicators JOURNAL ARTICLE published 2019 in Modern information security |
Functional model of the Security Operation Center JOURNAL ARTICLE published 28 August 2020 in Modern information security |
Analysis of weaknesses of the company's automated information security systems against insider attacks and methods for improving security JOURNAL ARTICLE published 2019 in Modern information security |
Application of internal point methods in cybersecurity problems of intelligent energy systems JOURNAL ARTICLE published 2021 in Modern information security |
Methodology for evaluating informational threats in the conditions of informational conflict JOURNAL ARTICLE published 2022 in Modern Information Security |
Detection of digital photomontage based on image contrast analysis JOURNAL ARTICLE published 2020 in Modern information security |
Topological identification of data transmission systems in the tasks of information protection at the objects of information activity JOURNAL ARTICLE published 2021 in Modern information security |
Legal bases and stages of building information security in Ukraine JOURNAL ARTICLE published 2022 in Modern Information Security |
Threat analysis of web-applications based on REST architecture JOURNAL ARTICLE published 2022 in Modern Information Security |
Analysis of protection mechanisms of Blockchain technology against cyberattacks JOURNAL ARTICLE published 2022 in Modern Information Security |
Security monitoring and management based on the use of IBM QRadar SIEM system JOURNAL ARTICLE published 2022 in Modern Information Security |
Investigation of cyber incidents in the corporate information system based on Autopsy and Volatility solutions JOURNAL ARTICLE published 2022 in Modern Information Security |
Ensuring the Stability of Cyber Defense of the State in the Conditions of Armed Conflict JOURNAL ARTICLE published 2023 in Modern Information Security |
The technology of ensuring the availability of information in the Data Center on the basis of achieving a balance of the performance of system elements JOURNAL ARTICLE published 2023 in Modern Information Security |
Assessment of personal data safety parameters in power social networks based on topology JOURNAL ARTICLE published 28 August 2020 in Modern information security |