Journal articles on the topic 'Mathematical data- Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Mathematical data- Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nurhidayati, Rika, and Salauddin Muis. "Analysis Of Voice Data Security Security By Using The Rc4 Algorithm." Jurnal Info Sains : Informatika dan Sains 11, no. 2 (September 1, 2021): 22–28. http://dx.doi.org/10.54209/infosains.v11i2.44.
Full textErkayev, Husan Ahmadaliyevich. "MATHEMATICAL MODEL OF CRYPTOGRAPHICAL HISTORICAL CODE ALGORITHMS TO DATA SECURITY." Theoretical & Applied Science 89, no. 09 (September 30, 2020): 30–33. http://dx.doi.org/10.15863/tas.2020.09.89.8.
Full textSaksonov, E. A. "Method of Depersonalization of Personal Data." INFORMACIONNYE TEHNOLOGII 27, no. 6 (June 9, 2021): 314–21. http://dx.doi.org/10.17587/it.27.314-321.
Full textHub, Miloslav, and Agnès Kateřina Příhodová. "Impact of Globalisation on Data Security – Authentication Issues." SHS Web of Conferences 92 (2021): 05009. http://dx.doi.org/10.1051/shsconf/20219205009.
Full textHorubała, Aleksandra, Daniel Waszkiewicz, Michał Andrzejczak, and Piotr Sapiecha. "Data confidentiality and computations hiding in cloud services for public administration." Computer Science and Mathematical Modelling, no. 7/2018 (July 18, 2018): 11–18. http://dx.doi.org/10.5604/01.3001.0012.2001.
Full textBolshakov, A. S., A. I. Zhila, and A. V. Osin. "FUZZY LOGIC DATA PROTECTION MANAGEMENT." H&ES Research 13, no. 4 (2021): 37–47. http://dx.doi.org/10.36724/2409-5419-2021-13-4-37-47.
Full textHenge, Santosh Kumar, Gitanjali Jayaraman, M. Sreedevi, R. Rajakumar, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai, and Ahmed Saeed AlGhamdi. "Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology." Networks and Heterogeneous Media 18, no. 3 (2023): 1313–34. http://dx.doi.org/10.3934/nhm.2023057.
Full textRaj, A. Samson Arun, R. Venkatesan, S. Malathi, V. D. Ambeth Kumar, E. Thenmozhi, Anbarasu Dhandapani, M. Ashok Kumar, and B. Chitra. "A Mathematical Queuing Model Analysis Using Secure Data Authentication Framework for Modern Healthcare Applications." Journal of Sensors 2022 (September 16, 2022): 1–15. http://dx.doi.org/10.1155/2022/8397635.
Full textLiu, Yutang, and Qin Zhang. "Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology." Journal of Function Spaces 2022 (August 2, 2022): 1–10. http://dx.doi.org/10.1155/2022/4292063.
Full textBoychenko, O. V., and D. V. Ivanyuta. "INFORMATION SECURITY MODELS." Construction economic and environmental management 80, no. 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.
Full textSutrisno, Agus, Aang Nuryaman, Muslim Ansori, and Ahmad Faisol. "Image Cryptography Based On A Second-Order QRT Difference Equation." International Journal of Mathematical, Engineering and Management Sciences 7, no. 3 (May 8, 2022): 399–416. http://dx.doi.org/10.33889/ijmems.2022.7.3.027.
Full textImankulova, B., S. Alpar, and S. Amanzholova. "DATA SECURITY, MODELING AND VISUALIZATION OF DATA FROM IOT DEVICES." Scientific Journal of Astana IT University 10 (June 30, 2022): 107–18. http://dx.doi.org/10.37943/acwt2121.
Full textKhandare, Snehal D., and Dr Shubhada S. Thakare. "Video Steganography Based on Modified Data Protection Scheme." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (August 31, 2023): 876–84. http://dx.doi.org/10.22214/ijraset.2023.55251.
Full textAljazaery, Ibtisam A., Haider Th Salim Alrikabi, and Mustafa Rabea Aziz. "Combination of Hiding and Encryption for Data Security." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 09 (June 17, 2020): 34. http://dx.doi.org/10.3991/ijim.v14i09.14173.
Full textSantoso, Yogi Suryo. "Message Security Using a Combination of Hill Cipher and RSA Algorithms." Jurnal Matematika Dan Ilmu Pengetahuan Alam LLDikti Wilayah 1 (JUMPA) 1, no. 1 (March 30, 2021): 20–28. http://dx.doi.org/10.54076/jumpa.v1i1.38.
Full textPoltavtseva, Maria. "Active Monitoring Model as a Basis for Security Management of Industrial CPS." Voprosy kiberbezopasnosti, no. 2(42) (2021): 51–60. http://dx.doi.org/10.21681/2311-3456-2021-2-51-60.
Full textKapopara, Eeva N., and Dr Prashant P. Pittalia. "A proposed approach for the key generation in cryptography to enrich the data confidentiality while sharing data over the network." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 24 (July 31, 2022): 26–32. http://dx.doi.org/10.55529/jaimlnn.24.26.32.
Full textAkhramovich, Volodymyr. "METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR." Cybersecurity: Education, Science, Technique 2, no. 14 (2021): 36–49. http://dx.doi.org/10.28925/2663-4023.2021.14.3649.
Full textKazakova, Nataliya. "Predictive Financial Security Analytics Using Industry Paradigm and Big Data Technology." Auditor 8, no. 12 (February 6, 2023): 37–43. http://dx.doi.org/10.12737/1998-0701-2022-8-12-37-43.
Full textIdris, Samwal, Anjali Mathur, and Asdaque Hussain. "Novel Enhanced Algorithm Based on DNA Cryptography to Secure Data Transfer over Network." Journal of Physics: Conference Series 2040, no. 1 (October 1, 2021): 012047. http://dx.doi.org/10.1088/1742-6596/2040/1/012047.
Full textLe, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (March 30, 2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Full textLin, Xiuchun. "Network Security Technology of Supply Chain Management Based on Internet of Things and Big Data." Computational Intelligence and Neuroscience 2022 (June 21, 2022): 1–12. http://dx.doi.org/10.1155/2022/7753086.
Full textHRYTSUN, Viktoriia. "STATISTICAL SECURITY OF ECONOMIC MANAGEMENT." Herald of Khmelnytskyi National University. Economic sciences 318, no. 3 (May 25, 2023): 180–85. http://dx.doi.org/10.31891/2307-5740-2023-318-3-28.
Full textDormidontov, A. V., L. V. Mironova, and V. S. Mironov. "POSSIBILITY OF THE MATHEMATICAL MODEL OF COUNTERACTION APPLICATION TO THE ASSESSMENT OF TRANSPORT INFRASTRUCTURE SECURITY LEVEL." Civil Aviation High TECHNOLOGIES 21, no. 3 (July 3, 2018): 67–77. http://dx.doi.org/10.26467/2079-0619-2018-21-3-67-77.
Full textAkhramovych, Volodymyr. "Method of calculating of the information in social networks protection depending on the number of communities." Collection "Information Technology and Security" 11, no. 1 (June 29, 2023): 15–26. http://dx.doi.org/10.20535/2411-1031.2023.11.1.279868.
Full textMilian, Yanuar Chris, and Wiwin Sulistyo. "Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, no. 2 (April 1, 2023): 208–16. http://dx.doi.org/10.35870/jtik.v7i2.716.
Full textSetti, Sunil, Indra Gunawan, Bahrudi Efendi Damanik, Sumarno Sumarno, and Ika Okta Kirana. "Implementasi Algoritma Advanced Encryption Standard dalam Pengamanan Data Penjualan Ramayana Department Store." JURIKOM (Jurnal Riset Komputer) 7, no. 1 (February 15, 2020): 182. http://dx.doi.org/10.30865/jurikom.v7i1.1960.
Full textYang, Min. "Information Security Risk Management Model for Big Data." Advances in Multimedia 2022 (August 8, 2022): 1–10. http://dx.doi.org/10.1155/2022/3383251.
Full textMazur, Katarzyna, Bogdan Ksiezopolski, and Adam Wierzbicki. "On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers." Mathematical Problems in Engineering 2015 (2015): 1–19. http://dx.doi.org/10.1155/2015/418535.
Full textGlushchenko, L. A., V. A. Golovkov, M. G. Karin, K. K. Morgunov, and V. I. Tupota. "Mathematical model of security of the information circulating in the open optical data link channel." Optical Memory and Neural Networks 19, no. 4 (December 2010): 338–43. http://dx.doi.org/10.3103/s1060992x10040120.
Full textLukova-Chuiko, N. V., O. A. Laptev, O. V. Barabash, A. P. Musienko, and V. M. Akhramovich. "THE METHOD OF CALCULATION OF PERSONAL DATA PROTECTION ON THE BASIS OF A SET OF SPECIFIC PARAMETERS OF SOCIAL NETWORKS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 76 (2022): 54–68. http://dx.doi.org/10.17721/2519-481x/2022/76-05.
Full textKotenko, Igor, and Igor Parashchuk. "Multi-criteria security assessment of control and diagnostic data on the technological processes." MATEC Web of Conferences 298 (2019): 00071. http://dx.doi.org/10.1051/matecconf/201929800071.
Full textSiregar, Al Zimy. "Implementation Of ADFGVX Cipher And RSA On TXT And Doc File Security." Journal Basic Science and Technology 10, no. 3 (October 30, 2021): 105–10. http://dx.doi.org/10.35335/jbst.v10i3.1764.
Full textBertozzi, Andrea L., Shane D. Johnson, and Michael J. Ward. "Mathematical modelling of crime and security: Special Issue of EJAM." European Journal of Applied Mathematics 27, no. 3 (April 28, 2016): 311–16. http://dx.doi.org/10.1017/s0956792516000176.
Full textSmirnova, Galina I., and Maria E. Listopad. "Economic and Mathematical Modeling of Russia’s Economic Security in the Period Under Sanctions." Economic Strategies 152 (March 25, 2020): 32–39. http://dx.doi.org/10.33917/es-2.168.2020.32-39.
Full textPham, Hai, Rainer Steinwandt, and Adriana Suárez Corona. "Integrating Classical Preprocessing into an Optical Encryption Scheme." Entropy 21, no. 9 (September 7, 2019): 872. http://dx.doi.org/10.3390/e21090872.
Full textSemenov, Serhii, Zhang Liqiang, Cao Weiling, and Viacheslav Davydov. "Development a mathematical model for the software security testing first stage." Eastern-European Journal of Enterprise Technologies 3, no. 2 (111) (June 30, 2021): 24–34. http://dx.doi.org/10.15587/1729-4061.2021.233417.
Full textSyahir, Ahmad, and Chuah Chai Wen. "Secure Login Mechanism for Online Banking." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (June 6, 2018): 179. http://dx.doi.org/10.30630/joiv.2.3-2.136.
Full textLachikhina, A. B., and A. A. Petrakov. "Data integrity as a criterion for assessing the security of corporate information systems resources." Issues of radio electronics, no. 11 (November 20, 2019): 77–81. http://dx.doi.org/10.21778/2218-5453-2019-11-77-81.
Full textVORONIN, EVGENY A., SERGEY V. KOZLOV, and ALEXANDER N. KUBANKOV. "IDENTIFICATION OF THREATS BASED ON A LIMITED SET OF DATA IN THE ASSESSMENT SECURITY SYSTEMS AND MEASURES FOR THEIR IMPLEMENTATION." H&ES Research 14, no. 3 (2022): 41–48. http://dx.doi.org/10.36724/2409-5419-2022-14-3-41-48.
Full textYang, Ai Wen. "The Evaluation Model Analysis on Credit Crisis Based on Data Mining and Nonlinear Regression Method." Applied Mechanics and Materials 427-429 (September 2013): 2898–902. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2898.
Full textHossain, Md Alam, Ahsan Ul-Ambia, Nazmul Hossain, Mustafizur Rahman Akhond, Nasim Adnan, and Sayed Md Galib. "Mathematical Solution of ULTE Based Salt Generation Password Based Key Derivation Function (PBKDF)." American Journal of Agricultural Science, Engineering, and Technology 6, no. 2 (July 7, 2022): 8–17. http://dx.doi.org/10.54536/ajaset.v6i2.368.
Full textKotenko, Igor Vitalievich, and Igor Borisovich Parashchuk. "Model of security information and event management system." Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2020, no. 2 (April 30, 2020): 84–94. http://dx.doi.org/10.24143/2072-9502-2020-2-84-94.
Full textTao, Q., Q. Chen, H. Ding, I. Adnan, X. Huang, and X. Cui. "Cross-Department Secures Data Sharing in Food Industry via Blockchain-Cloud Fusion Scheme." Security and Communication Networks 2021 (March 27, 2021): 1–18. http://dx.doi.org/10.1155/2021/6668339.
Full textAkhramovych, Volodymyr, German Shuklin, Yuriy Pepa, Tetiana Muzhanova, and Serhii Zozulia. "Devising a procedure to determine the level of informational space security in social networks considering interrelations among users." Eastern-European Journal of Enterprise Technologies 1, no. 9(115) (February 28, 2022): 63–74. http://dx.doi.org/10.15587/1729-4061.2022.252135.
Full textFeng, Feng, Xiabing Zhou, Bin Li, and Qinglei Zhou. "Modelling the Mimic Defence Technology for Multimedia Cloud Servers." Security and Communication Networks 2020 (November 27, 2020): 1–22. http://dx.doi.org/10.1155/2020/8819958.
Full textVivchar, Oksana. "SPECIFIC FEATURES OF ECONOMIC SECURITY ASSESSMENT OF ENTERPRISES UNDER CURRENT CONDITIONS OF BUSINESS MACROTRENDS: A REGIONAL APPROACH." Regional’ni aspekti rozvitku produktivnih sil Ukraїni, no. 24 (2019): 15–23. http://dx.doi.org/10.35774/rarrpsu2019.24.015.
Full textAulia, Rachmat, Haida Dafitri, Bayu Irwandi, and Rizko Liza. "Penerapan Algoritma Vertical Bit Rotation Dalam Pengamanan Data Sekolah." Building of Informatics, Technology and Science (BITS) 3, no. 4 (March 31, 2022): 713–18. http://dx.doi.org/10.47065/bits.v3i4.1340.
Full textSuwarjono, Suwarjono, Lilik Sumaryanti, and Lusia Lamalewa. "Cryptography Implementation for electronic voting security." E3S Web of Conferences 328 (2021): 03005. http://dx.doi.org/10.1051/e3sconf/202132803005.
Full textSnishchenko, R. H., V. I. Hrynchutskyi, Yu M. Nikolchuk, O. O. Lopatovska, and L. M. Krot. "Financial security of macro regions in the period of military aggression." Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu, no. 4 (August 2023): 157–63. http://dx.doi.org/10.33271/nvngu/2023-4/157.
Full text