Article |
ANALYSIS OF INFORMATION SECURITY OF OBJECTS UNDER ATTACKS |
Abstract: In this paper a methodology for evaluation of information security of objects under attacks, processed
by methods of compression, is represented. Two basic parameters for evaluation of info |
Article |
ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ... |
Abstract: In this paper an analysis of possibilities offered by virtual environments for accomplishing attacks to
and within it, is made. Main techniques for accomplishing an attack to virtual enviro |
Article |
ANALYSIS OF MALICIOUS ATTACKS ACCOMPLISHED IN REAL AND VIRTUAL ENVIRONMENT |
Abstract: In this paper an analysis of possibilities offered by virtual environments for accomplishing attacks to
and within it, is made. Main techniques for accomplishing an attack to virtual enviro |
Article |
APPLICATION OF METHODS OF MULTI-CRITERIA EVALUATION IN CHOOSING A METHOD ... |
Abstract: In this paper is proposed a model for researching the capability to influence, by selected methods’
groups of compression, to the co-efficient of information security of selected objects� |
Article |
CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES ... |
Abstract: This paper deals with the security problems of DRM protected e-learning content. After a short review
of the main DRM systems and methods used in e-learning, an examination is made of parti |
Article |
CORRELATION-BASED PASSWORD GENERATION FROM FINGERPRINTS |
Abstract: In this paper, a methodology for reliable password generation from fingerprints is developed. In
contrast to traditional biometric systems, proposed algorithm does not authenticate user by |
Article |
EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS ... |
Abstract: The principal methods of compression and different types of non-encrypted objects are described. An
analysis is made of the results obtained from examinations of the speed of compression fo |
Article |
IMPROVING OF EXISTING PERMISSION SYSTEM IN ANDROID OS |
Abstract: Smartphones for last five-ten years had become ubiquitous. Despite the fact, that these small
devices are very widespread around the world - security are still being understood. As a result |
Article |
INVESTIGATING THE RELATIONS OF ATTACKS, METHODS AND OBJECTS ... |
Abstract: Possibilities for investigations of 43 varieties of file formats (objects), joined in 10 groups; 89
information attacks, joined in 33 groups and 73 methods of compression, joined in 10 grou |
Article |
INVESTIGATION ON COMPRESSION METHODS USED AS A PROTECTION INSTRUMENT ... |
Abstract: This report examines important issues related to different ways to influence the information security of file objects, subjected to information attacks by the methods of compression. Accordi |
Article |
PASSIVE STEGANALYSIS OF MULTIDOMAIN EMBEDDING METHODS |
Abstract: The paper is devoted to analysis of effectiveness the usage of modern statistical model of
digital image for revealing the stego images with data, embedded in transformation domain of cover |
Article |
RESEARCH OF THE INFLUENCE OF METHODS OF COMPRESSION ON ... |
Abstract: In this paper a possibility for quantitative measuring of information security of objects, exposed to
information attacks and processed with methods of compression, is represented. A co-eff |
Article |
THREAT MODEL FOR USER SECURITY IN E-LEARNING SYSTEMS |
Abstract: This paper suggest a generic threat model for the processes in e-learning systems. After a breaf
discussion of the particularities of e-learning systems from the security point of view, the |
Article |
VERIFICATION AND APPLICATION OF CONCEPTUAL MODEL AND SECURITY ... |
Abstract: The paper represents a verification of a previously developed conceptual model of security related
processes in DRM implementation. The applicability of established security requirements in |
Article |
КОСВЕННАЯ СТЕГАНОГРАФИЯ |
Аннотация: Описывается оригинальный метод шифрования и дешифрования на основе способа,
называемого косвенн |