8   Artículos

 
en línea
D. V. Smirnov,A. A. Grusho,M. I. Zabezhailo,E. E. Timonina     Pág. 64 - 71
The problem of constructing an architecture and methods of searching for insider activity signs in process-real-time conditions has been investigated. The problem is solved in the following conditions. The source of "raw" data is Big Data, from which dat... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
V. O. Piskovski,A. A. Grusho,M. I. Zabezhailo,A. V. Nikolaev,V. V. Senchilo,E. E. Timonina     Pág. 48 - 52
The article considers the task to protect information when an adversary uses methods of collecting valuable information on indirect signs in the information environment available to attackers. It is assumed that all personal data in the considered inform... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
A. A. Grusho,M. I. Zabezhailo,D. V. Smirnov,E. E. Timonina     Pág. 43 - 50
Authentication data, such as password, key word, passport number, etc., authentication material, such as biometric fingerprint, faces, etc., authentication objects, such as phone, passport, token, etc., can be spotted, forged and transferred to the malef... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
A. A. Grusho,N. A. Grusho,M. I. Zabezhailo,E. E. Timonina     Pág. 61 - 66
In the paper the methods of estimation of security of the distributed information systems in the conditions of assumptions of security with usage of language of diagrams of information security are developed. The principle of prevention of damage which c... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »