Journal articles on the topic 'Modern methods of information protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Modern methods of information protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shelupanov, Alexander, Oleg Evsyutin, Anton Konev, Evgeniy Kostyuchenko, Dmitry Kruchinin, and Dmitry Nikiforov. "Information Security Methods—Modern Research Directions." Symmetry 11, no. 2 (2019): 150. http://dx.doi.org/10.3390/sym11020150.
Full textSharsheeva, K. T., A. N. Zhumabaeva, and G. M. Usubakunova. "RESEARCH OF INFORMATION SYSTEMS PROTECTION METHODS USING MODERN AUTHENTICATION METHODS." Herald of KSUCTA n a N Isanov, no. 1-2021 (March 22, 2021): 20–25. http://dx.doi.org/10.35803/1694-5298.2021.1.20-25.
Full textIbrokhimova, Maftunakhona. "MODERN METHODS AND MEANS OF ENSURING INFORMATION SECURITY." Research and implementation 2, no. 2 (2024): 151–58. https://doi.org/10.5281/zenodo.10687797.
Full textQizi, Toshboyeva Feruza To'lqin, and Bebutova Zulayxo Hamidovna. "MODERN METHODS AND ESSENCE OF ENSURING INFORMATION SECURITY IN THE INFORMATION SOCIETY." European Journal of Contemporary Business Law & Technology: Cyber Law, Blockchain, and Legal Innovations 1, no. 7 (2024): 106–11. https://doi.org/10.61796/ejcblt.v1i7.872.
Full textKhavikova, Yuliia. "PROTECTION OF INFORMATION IN ELECTRONIC SERVICES." Cybersecurity: Education, Science, Technique 1, no. 25 (2024): 215–28. http://dx.doi.org/10.28925/2663-4023.2024.25.215228.
Full textSHEVKO, N. R. "CYBER THREATS IN THE NEW REALITY OF RUSSIA: STATUS AND METHODS OF COUNTERING." Victimology 11, no. 4 (2024): 528–37. https://doi.org/10.47475/2411-0590-2024-11-4-528-537.
Full textOliinyk, Yaroslav, Artem Platonenko, Vyacheslav Cherevyk, Maksym Vorokhob, and Yurii Shevchuk. "METHODS OF INFORMATION SECURITY IN IOT-TECHNOLOGIES." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 100–108. https://doi.org/10.28925/2663-4023.2025.27.705.
Full textShelupanov, A. A., O. O. Evsutin, A. A. Konev, E. Yu Kostychenko, D. V. Kruchinin, and D. S. Nikiforov. "Modern trends in development of methods and means for information protection." Proceedings of Tomsk State University of Control Systems and Radioelectronics 20, no. 3 (2017): 11–24. http://dx.doi.org/10.21293/1818-0442-2017-20-3-11-24.
Full textFediushyn, O. I., Y. V. Holovko, A. O. Smirnov, V. M. Sukhoteplyi, and O. V. Chechui. "Methods of information protection based on quantum image steganography." Radiotekhnika, no. 218 (September 26, 2024): 44–55. https://doi.org/10.30837/rt.2024.3.218.03.
Full textNikitin, Petr Vladimirovich, and Rimma Ivanovna Gorokhova. "Analysis of modern intelligent methods for protecting critical information infrastructure." Вопросы безопасности, no. 3 (March 2024): 14–38. http://dx.doi.org/10.25136/2409-7543.2024.3.69980.
Full textTsekhmeister, Rostyslav, Artem Platonenko, Maksym Vorokhob, Vyacheslav Cherevyk, and Svitlana Semeniaka. "RESEARCH OF INFORMATION SECURITY PROVISION METHODS IN A VIRTUAL ENVIRONMENT." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 63–71. https://doi.org/10.28925/2663-4023.2025.27.703.
Full textLukova-Chuiko, Natalia, Serhii Toliupa, and Ivan Parkhomenko. "Intrusion detection methods in modern IDS systems." Information systems and technologies security, no. 1 (5) (2021): 19–26. http://dx.doi.org/10.17721/ists.2021.1.17-24.
Full textNovichkov, V. E. "Information Habitat and its Criminal Law Protection." Proceedings of Southwest State University. Series: History and Law 13, no. 4 (2023): 93–106. http://dx.doi.org/10.21869/2223-1501-2023-13-4-93-106.
Full textFedorchenko, Volodymyr, Olha Yeroshenko, Oleksandr Shmatko, Oleksii Kolomiitsev, and Murad Omarov. "PASSWORD HASHING METHODS AND ALGORITHMS ON THE .NET PLATFORM." Advanced Information Systems 8, no. 4 (2024): 82–92. http://dx.doi.org/10.20998/2522-9052.2024.4.11.
Full textLaptiev, Serhii. "THE ADVANCED METHOD OF PROTECTION OF PERSONAL DATA FROM ATTACKS USING SOCIAL ENGINEERING ALGORITHMS." Cybersecurity: Education, Science, Technique 16, no. 4 (2022): 45–62. http://dx.doi.org/10.28925/2663-4023.2022.16.4562.
Full textPopov, A. D., and A. D. Popova. "Analysis of information security technologies for use in the enterprise infrastructure." Herald of Dagestan State Technical University. Technical Sciences 49, no. 4 (2023): 78–84. http://dx.doi.org/10.21822/2073-6185-2022-49-4-78-84.
Full textPeliukh, O. I., M. V. Yesina, and D. Yu Holubnychyi. "Modern threats to information and communication systems and methods of protection against them." Radiotekhnika, no. 216 (March 20, 2024): 46–56. http://dx.doi.org/10.30837/rt.2024.1.216.03.
Full textKulikov, Aleksandr, Pavel Ilyushin, and Anton Loskutov. "Enhanced Readability of Electrical Network Complex Emergency Modes Provided by Data Compression Methods." Information 14, no. 4 (2023): 230. http://dx.doi.org/10.3390/info14040230.
Full textNikolaeva, Kristina A., and Aelita V. Shaburova. "THE PROBLEM OF ENSURING INFORMATION SECURITY AT ENTERPRISES IN MODERN CONDITIONS." Interexpo GEO-Siberia 6 (May 21, 2021): 230–34. http://dx.doi.org/10.33764/2618-981x-2021-6-230-234.
Full textSanieva, Alina D. "SECURITYAND DATA PROTECTION IN UNMANNED INFORMATION TRANSMISSION SYSTEMS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 7/6, no. 148 (2024): 14–22. http://dx.doi.org/10.36871/ek.up.p.r.2024.07.06.002.
Full textZharkov, Grigoriy, Sergey Pshenichnyy, and Marina Ozhiganova. "Analysis of ERP-Systems Protection Methods." NBI Technologies, no. 3 (January 2019): 24–28. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.4.
Full textDzhulij, V. M., V. A. Boychuk, V. Y. Titova, O. V. Selyukov, and O. V. Miroshnichenko. "PROTECTION MODELS AND METHODS AGAINST THREATED PROGRAMS INFORMATION SYSTEMS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 67 (2020): 72–84. http://dx.doi.org/10.17721/2519-481x/2020/67-08.
Full textSkitsko, Oleksii. "ATTACK SURFACE IN THE CONTEXT OF ITS USERS (“TREAT ACTORS”) FOR CRITICAL INFRASTRUCTURE FACILITIES." Cybersecurity: Education, Science, Technique 4, no. 24 (2024): 229–40. http://dx.doi.org/10.28925/2663-4023.2024.24.229240.
Full textChikrii, Arkadii, Ihor Martyniuk, Alona Desiatko, Inna Malyukova, and Roman Shyrshov. "THE RELEVANCE OF CREATING AN INTELLIGENT SYSTEM FOR PROTECTION OF DIGITAL CURRENCIES WITH LOW HASHRATE." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 41–53. https://doi.org/10.28925/2663-4023.2025.27.714.
Full textАнтипина, Н. М., Ф. А. Юн, Т. А. Гусева, and А. В. Желтенков. "Actual problems of ensuring information security." Экономика и предпринимательство, no. 4(129) (May 31, 2021): 1221–25. http://dx.doi.org/10.34925/eip.2021.129.4.242.
Full textGurevich, Vladimir. "Susceptibility of modern relay protection: Will protection from cyber attacks help?" Serbian Journal of Electrical Engineering 11, no. 2 (2014): 233–41. http://dx.doi.org/10.2298/sjee131026019g.
Full textSemenovikh, A. E. "Legal Protection of Genetic and Genomic Information in Genomic Legal Relationship: A Civil Law Aspect." Lex Genetica 3, no. 3 (2024): 93–106. http://dx.doi.org/10.17803/lexgen-2024-3-3-93-106.
Full textKozyreva, Nadezhda Ivanovna, Mihail Olegovich Muhtulov, Sergei Aleksandrovich Ershov, Sofiya Vladimirovna Novoseltseva, and Dinar Ayratovich Akhmadullin. "Modern methods of preventing DDoS attacks and protecting web servers." Программные системы и вычислительные методы, no. 2 (February 2025): 190–203. https://doi.org/10.7256/2454-0714.2025.2.73667.
Full textShcheblanin, Yurii, Bohdan Sydorenko, and Inna Mykhalchuk. "SECURITY OF REST API: THREATS AND PROTECTION METHODS." Information systems and technologies security, no. 2 (8) (2024): 60–65. https://doi.org/10.17721/ists.2024.8.60-65.
Full textSenyk, Sviatoslav, Oleksandr Kondratiuk, Ihor Fedchak, Stepan Tserkovnyk, and Marianna Fedun. "Application of international standards with a view to ensuring legal and organizational aspects of information protection in specialized information systems." Cuestiones Políticas 41, no. 76 (2023): 419–36. http://dx.doi.org/10.46398/cuestpol.4176.24.
Full textShevchenko, Svitlana, Yulia Zhdanovа, Svitlana Spasiteleva, Olena Negodenko, Nataliia Mazur, and Kateryna Kravchuk. "MATHEMATICAL METHODS IN CYBER SECURITY: FRACTALS AND THEIR APPLICATIONS IN INFORMATION AND CYBER SECURITY." Cybersecurity: Education, Science, Technique, no. 5 (2019): 31–39. http://dx.doi.org/10.28925/2663-4023.2019.5.3139.
Full textRodionov, Aleksandr, Vladislav Belyanin, and Aleksandr Gorbunov. "Improving the Methods for Protecting Information from Unauthorized Access." NBI Technologies, no. 2 (December 2018): 39–43. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.6.
Full textDiachenko, L., N. Dichek, and O. Orel. "Information in the modern digital world." Fundamental and applied researches in practice of leading scientific schools 38, no. 2 (2020): 135–38. http://dx.doi.org/10.33531/farplss.2020.2.24.
Full textVolosatova, Tamara M., and Anastasiya A. Kozar’. "ANALYSIS OF THE APPLICATION OF DIGITAL HOLOGRAPHY METHODS FOR INFORMATION PROTECTION." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 4 (2022): 44–58. http://dx.doi.org/10.28995/2686-679x-2022-4-44-58.
Full textPechyonkina, Angelika, and Igor Karmanov. "APPLICATION OF DIGITAL WATERMARKS FOR INTELLECTUAL PROPERTY PROTECTION." Interexpo GEO-Siberia 6, no. 2 (2019): 159–68. http://dx.doi.org/10.33764/2618-981x-2019-6-2-159-168.
Full textLaptiev, Oleksandr, Vitalii Savchenko, Alla Kobozieva, Anatolii Salii, and Tymur Kurtseitov. "METHODS FOR ASSESSING INFORMATION SECURITY IN COMMUNICATION NETWORKS." Cybersecurity: Education, Science, Technique 3, no. 27 (2025): 522–33. https://doi.org/10.28925/2663-4023.2025.27.767.
Full textShkilniak, S. S., and Yu Yu Yurchenko. "Methods of ensuring the security of computer network." Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.
Full textIsrafilov, A. "CYBERSECURITY IN THE AUTOMOTIVE INDUSTRY: VULNERABILITIES AND PROTECTION." Sciences of Europe, no. 145 (July 26, 2024): 60–63. https://doi.org/10.5281/zenodo.12910322.
Full textShevchuk, M. O. "The mechanism for ensuring information security of individuals." Analytical and Comparative Jurisprudence, no. 6 (December 16, 2024): 684–89. https://doi.org/10.24144/2788-6018.2024.06.113.
Full textMetelkov, A. "About cryptographic information protection measures in the implementation of information technology in the solution of management problems in the social and economic systems." National Security and Strategic Planning 2020, no. 4 (2021): 68–78. http://dx.doi.org/10.37468/2307-1400-2021-2020-4-68-78.
Full textRymchuk, Iryna, Serhii Kostiuchko, Mykola Polishchuk, Serhii Hryniuk, and Liudmyla Konkevych. "COMMUNICATION PROCESSES SECURITY USING VISUAL CRYPTOGRAPHY." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 258–67. https://doi.org/10.28925/2663-4023.2024.26.677.
Full textAboelfotoh, Said F., and Noha A. Hikal. "A Review of Cyber-security Measuring and Assessment Methods for Modern Enterprises." JOIV : International Journal on Informatics Visualization 3, no. 2 (2019): 157. http://dx.doi.org/10.30630/joiv.3.2.239.
Full textShchinnikov, Ilya, Stanislav Tokarev, and Dmitry Surinsky. "Justification of the need to systematize pest control at AIC objects." АгроЭкоИнфо 1 S (October 15, 2022): 7. http://dx.doi.org/10.51419/20212s1107.
Full textNovruz Aliyeva, Yegana, and Laman Qadir Ibrahimova. "ANALYSIS OF THE PROBLEM OF PROTECTION OF INFORMATION IN THE CORPORATE INFORMATION SYSTEMS SEGMENT." Elmi Əsərlər, no. 1 (June 10, 2024): 77–82. http://dx.doi.org/10.61413/uxhj2154.
Full textGumenyuk, Ludmila. "CYBER INSURANCE: MODERN REQUIREMENTS." Economics & Education 6, no. 4 (2021): 33–36. http://dx.doi.org/10.30525/2500-946x/2021-4-5.
Full textProkopova, M. V. "Flooding Hazard Assessment of Built-Up Lands Using Modern Geographic Information Systems." Modern Trends in Construction, Urban and Territorial Planning 1, no. 2 (2022): 23–32. http://dx.doi.org/10.23947/2949-1835-2022-1-2-23-32.
Full textAlieksieiev, Artem, and Igor Svatovskiy. "ANALYSIS OF COMMON AUDIO STEGANOGRAPHY METHODS." Grail of Science, no. 34 (December 16, 2023): 117–18. http://dx.doi.org/10.36074/grail-of-science.08.12.2023.24.
Full textProkopovych-Tkachenko, Dmytro, Liudmyla Rybalchenko, and Yaroslav Derkach. "Steganographic Methods in Information Security." Central Ukrainian Scientific Bulletin. Technical Sciences 2, no. 11(42) (2025): 79–86. https://doi.org/10.32515/2664-262x.2025.11(42).2.79-86.
Full textYi, Ding. "Research on the Relevant Methods and Technologies of Digital Watermarking." Highlights in Science, Engineering and Technology 47 (May 11, 2023): 217–23. http://dx.doi.org/10.54097/hset.v47i.8210.
Full textOstrovskikh, Zh V., O. M. Khokhlova, and A. K. Rozhkova. "Information security in the national security system of modern Russia during the pandemic COVID-19." Siberian Law Herald 2022.2 (2022): 105–15. http://dx.doi.org/10.26516/2071-8136.2022.2.105.
Full text