Journal articles on the topic 'Security and efficiency of information system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security and efficiency of information system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kiedrowicz, Maciej, and Jerzy Stanik. "Method for assessing efficiency of the information security management system." MATEC Web of Conferences 210 (2018): 04011. http://dx.doi.org/10.1051/matecconf/201821004011.
Full textKim, Taekyung. "Tourism Information Reservation System considering the Security and Efficiency." Journal of the Korea Society of Digital Industry and Information Management 11, no. 2 (June 30, 2015): 67–72. http://dx.doi.org/10.17662/ksdim.2015.11.2.067.
Full textZeng, Yi. "Related Research on the Crime of Illegal Invasion into Computer Information System." Advanced Materials Research 1079-1080 (December 2014): 733–36. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.733.
Full textLivshits, Ilia, and Pavel Lontsikh. "FORMATION OF METRICS TO MEASURE INFORMATION SECURITY MANAGEMENT SYSTEM EFFICIENCY." Proceedings of Irkutsk State Technical University 112, no. 5 (May 2016): 65–72. http://dx.doi.org/10.21285/1814-3520-2016-5-65-72.
Full textDai, Jing Jing, Hui Min Hu, and Qing Cai. "Effectiveness Evaluation of Security System Based on Entropy Theory." Applied Mechanics and Materials 40-41 (November 2010): 806–11. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.806.
Full textGoldobina, Anastasiya, and Valentin Selifanov. "EFFICIENCY EVALUATION OF PROTECTION TOOLS OF STATE INFORMATION SYSTEMS." Interexpo GEO-Siberia 6, no. 1 (2019): 115–21. http://dx.doi.org/10.33764/2618-981x-2019-6-1-115-121.
Full textLajevskis, Vladimirs, Pjotrs Dorogovs, and Andrejs Romanovs. "It Security System Development for State Institution." Scientific Journal of Riga Technical University. Computer Sciences 39, no. 1 (January 1, 2009): 27–32. http://dx.doi.org/10.2478/v10143-010-0003-0.
Full textSuhanov, Valeriy, and Oleg Lankin. "Methodology of logical design of information support for distributed information systems of critical application." Modeling of systems and processes 14, no. 3 (September 22, 2021): 67–73. http://dx.doi.org/10.12737/2219-0767-2021-14-3-67-73.
Full textZhao, Dong Ming, and Kai Feng Zhu. "Network Security Isolation System Based on Information Filtering." Applied Mechanics and Materials 707 (December 2014): 458–61. http://dx.doi.org/10.4028/www.scientific.net/amm.707.458.
Full textKlenin, Dmitriy, and Elena Maksimova. "The Model of Intrusion into the Information System." NBI Technologies, no. 3 (January 2019): 19–23. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.3.
Full textKarimov, Majid, and Sevara Khamdamova. "ISSUES IN FUNCTIONING EFFICIENCY OF SECURITY MONITORING SYSTEMS IN INFOCOMMUNICATION SYSTEMS." Technical science and innovation 2021, no. 3 (June 28, 2021): 66–72. http://dx.doi.org/10.51346/tstu-02.21.3-77-0022.
Full textГорлов, Алексей, Aleksey Gorlov, Михаил Рытов, Mikhail Rytov, Дмитрий Лысов, and Dmitriy Lysov. "AUTOMATION OF PROCESS AN ASSESSMENT EFFICIENCY OF COMPLEX SYSTEMS OF INFORMATION SECURITY OF THE INDUSTRIAL ENTERPRISES IN CASE WITH SIMULTANEOUS IMPLEMENTATION OF THREATS." Bulletin of Bryansk state technical university 2016, no. 4 (December 28, 2016): 199–206. http://dx.doi.org/10.12737/23236.
Full textBaisholan, N., K. E. Kubayev, and T. S. Baisholanov. "MODERN TOOLS FOR INFORMATION SECURITY SYSTEMS." PHYSICO-MATHEMATICAL SERIES 335, no. 1 (February 8, 2021): 14–18. http://dx.doi.org/10.32014/2021.2224-5294.2.
Full textBaisholan, N., K. E. Kubayev, and T. S. Baisholanov. "MODERN TOOLS FOR INFORMATION SECURITY SYSTEMS." PHYSICO-MATHEMATICAL SERIES 335, no. 1 (February 8, 2021): 14–18. http://dx.doi.org/10.32014/2021.2518-1726.2.
Full textTabakaeva, Valeria A., Igor N. Karmanov, and Vladimir R. An. "FEATURES OF INTELLIGENT INFORMATION SECURITY MANAGEMENT SYSTEMS FOR CRITICAL INFORMATION INFRASTRUCTURE OBJECTS." Interexpo GEO-Siberia 6, no. 2 (July 8, 2020): 99–104. http://dx.doi.org/10.33764/2618-981x-2020-6-2-99-104.
Full textIzergin, Dmitriy A., Mikhail A. Eremeev, Shamil G. Magomedov, and Stanislav I. Smirnov. "Information security evaluation for Android mobile operating system." Russian Technological Journal 7, no. 6 (January 10, 2020): 44–55. http://dx.doi.org/10.32362/2500-316x-2019-7-6-44-55.
Full textBolsunovskaya, Marina, Svetlana Shirokova, Aleksandra Loginova, and Mikhail Uspenskij. "Developing a procedure for conducting a security audit of a software package for predicting storage system failures." MATEC Web of Conferences 245 (2018): 10007. http://dx.doi.org/10.1051/matecconf/201824510007.
Full textBatskikh, A. V., V. V. Konobeevskikh, and S. V. Efimov. "Methods for assessing the efficiency of access control subsystems at informatization facilities of internal affairs bodies and aspects of their improvement." Herald of Dagestan State Technical University. Technical Sciences 48, no. 2 (July 31, 2021): 29–39. http://dx.doi.org/10.21822/2073-6185-2021-48-2-29-39.
Full textYakymenko, Yuriy, Tetyana Muzhanova, and Svitlana Lehominova. "SYSTEM ANALYSIS OF TECHNICAL SYSTEMS FOR ENSURING INFORMATION SECURITY OF FIREEYE ENTERPRISES." Cybersecurity: Education, Science, Technique 12, no. 4 (June 24, 2021): 36–50. http://dx.doi.org/10.28925/2663-4023.2021.12.3650.
Full textChubaievskyi, Vitaliy, Valerii Lakhno, Olena Kryvoruchko, Dmytro Kasatkin, Alona Desiatko, and Andrii Blozva. "EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS." Cybersecurity: Education, Science, Technique 12, no. 4 (June 24, 2021): 96–107. http://dx.doi.org/10.28925/2663-4023.2021.12.96107.
Full textGoldobina, Anastasiya S., Julia A. Isaeva, and Dmitry M. Nikulin. "EVALUATION OF THE EFFICIENCY OF INTRUSION DETECTION SYSTEMS IN PRODUCTION MANAGEMENT INFORMATION SYSTEM OF A MILITARY-INDUSTRIAL COMPLEX." Interexpo GEO-Siberia 6, no. 1 (July 8, 2020): 99–103. http://dx.doi.org/10.33764/2618-981x-2020-6-1-99-103.
Full textSalmanova, I. P., O. I. Kuznetsova, S. A. Kruchinina, and A. S. Bulat. "Creating an expert system for assessing the economic efficiency of investments in information security." Voprosy regionalnoj ekonomiki 35, no. 4 (December 30, 2018): 102–9. http://dx.doi.org/10.21499/2078-4023-2018--4-102-109.
Full textFan, Kai, Hang Yang, and Aidong Xu. "Analysis of Power Network Behavior Security Analysis Technology." MATEC Web of Conferences 246 (2018): 03017. http://dx.doi.org/10.1051/matecconf/201824603017.
Full textMa, Li, Li Ying Cao, and Yue Ling Zhao. "Research of Intelligent Building Security Automatic Monitoring Alarm System." Advanced Materials Research 1049-1050 (October 2014): 1185–88. http://dx.doi.org/10.4028/www.scientific.net/amr.1049-1050.1185.
Full textLuo, Lin. "Policy Research of Network Security about Employment Management System in Colleges and Universities." Applied Mechanics and Materials 71-78 (July 2011): 4353–56. http://dx.doi.org/10.4028/www.scientific.net/amm.71-78.4353.
Full textBelokurov, Sergey, Alexei Skrypnikov, Oleg Kondratov, Dmitry Levushkin, and Oleg Tveritnev. "Increasing the energy efficiency of electronic document management systems." E3S Web of Conferences 279 (2021): 03029. http://dx.doi.org/10.1051/e3sconf/202127903029.
Full textRaei Dehaghi, Morteza. "The Relation of Information Security Management System Efficiency with Organizational Agility Case Study: Isfahan Mobarakeh Steel Company." International Journal of Business and Management 11, no. 8 (July 20, 2016): 116. http://dx.doi.org/10.5539/ijbm.v11n8p116.
Full textHorbachenko, S. "Cyber security as a component of economic security of Ukraine." Galic'kij ekonomičnij visnik 66, no. 5 (2020): 180–86. http://dx.doi.org/10.33108/galicianvisnyk_tntu2020.05.180.
Full textLitvinchuk, Iryna, Nataliia Korshun, and Maksym Vorokhob. "METHOD OF EVALUATION OF INTEGRATED SECURITY SYSTEMS AT THE OBJECT OF INFORMATION ACTIVITY." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 135–43. http://dx.doi.org/10.28925/2663-4023.2020.10.135143.
Full textZhang, Jin Hai. "Research of Network Information Platform Construction of ERP System in Manufacturing." Applied Mechanics and Materials 644-650 (September 2014): 2830–33. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2830.
Full textMaharjan, Hira Gopal. "Land Records Information Management System." Journal on Geoinformatics, Nepal 14 (March 13, 2017): 26–31. http://dx.doi.org/10.3126/njg.v14i0.16970.
Full textMalikov, Albert, Vladimir Avramenko, and Igor Saenko. "Model and method for diagnosing computer incidents in information and communication systems based on deep machine learning." Information and Control Systems, no. 6 (December 26, 2019): 32–42. http://dx.doi.org/10.31799/1684-8853-2019-6-32-42.
Full textDoynikova, Elena, Andrey Fedorchenko, Igor Kotenko, and Evgenia Novikova. "Security Assessment Methodology Based on the Semantic Model of Metrics and Data." Voprosy kiberbezopasnosti, no. 1(41) (2021): 29–40. http://dx.doi.org/10.21681/2311-3456-2021-1-29-40.
Full textPanda, Soumyashree S., Debasish Jena, and Priti Das. "A Blockchain-Based Distributed Authentication System for Healthcare." International Journal of Healthcare Information Systems and Informatics 16, no. 4 (October 2021): 1–14. http://dx.doi.org/10.4018/ijhisi.20211001.oa12.
Full textVolosnikova, N. M. "The Methodical Principles of Controlling the Information System of Corporate Security." Business Inform 5, no. 520 (2021): 141–46. http://dx.doi.org/10.32983/2222-4459-2021-5-141-146.
Full textKravchenko, Sergey. "The Security of Socio-Technical Systems." NBI Technologies, no. 2 (December 2018): 20–24. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.3.
Full textRuan, Xian Jing. "Information Security System of the New Energy Automobile Production Line Based on RFID." Applied Mechanics and Materials 416-417 (September 2013): 1434–38. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1434.
Full textJaysawal, Anoop. "Cyber Security in Smart Grid System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 341. http://dx.doi.org/10.23956/ijarcsse.v7i8.85.
Full textLiu, Bang Fan, Tao Tao, and Bei Zhang. "How to Design the E-Government Information Security Legislation." Applied Mechanics and Materials 556-562 (May 2014): 5367–70. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5367.
Full textZhang, Pan, Fenggang Lai, Jing Du, Wenda Lu, and Xiao Yu. "A Multimodality Information Synchronization Scheme for a Multisource Information System in the Electric Grid." Security and Communication Networks 2021 (April 30, 2021): 1–7. http://dx.doi.org/10.1155/2021/5513590.
Full textLiu, Ying Xin, and Wei Shi. "Design on Enterprise Information Management System Based on SSH Frame." Applied Mechanics and Materials 198-199 (September 2012): 233–37. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.233.
Full textJia, Ling. "The Research and Application of Network Security Technology in the University Network." Advanced Materials Research 756-759 (September 2013): 791–95. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.791.
Full textLaptiev, Oleksandr, Valentyn Sobchuk, Andrii Sobchuk, Serhii Laptiev, and Tatiana Laptieva. "IMPROVED MODEL OF ESTIMATING ECONOMIC EXPENDITURES ON THE INFORMATION PROTECTION SYSTEM IN SOCIAL NETWORKS." Cybersecurity: Education, Science, Technique 12, no. 4 (June 24, 2021): 19–28. http://dx.doi.org/10.28925/2663-4023.2021.12.1928.
Full textDudykevych, Valeriy, Ivan Prokopyshyn, Vasyl Chekurin, Ivan Opirskyy, Yuriy Lakh, Taras Kret, Yevheniia Ivanchenko, and Ihor Ivanchenko. "A multicriterial analysis of the efficiency of conservative information security systems." Eastern-European Journal of Enterprise Technologies 3, no. 9 (99) (May 8, 2019): 6–13. http://dx.doi.org/10.15587/1729-4061.2019.166349.
Full textLitvinchuk, Iryna, Ruslan Korchomnyi, Nataliia Korshun, and Maksym Vorokhob. "APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 98–112. http://dx.doi.org/10.28925/2663-4023.2020.10.98112.
Full textYandri, Erkata, Roy Hendroko Setyobudi, Herry Susanto, Kamaruddin Abdullah, Yogo Adhi Nugroho, Satriyo Krido Wahono, Feri Wijayanto, and Yanuar Nurdiansyah. "Conceptualizing Indonesia’s ICT-based Energy Security Tracking System with Detailed Indicators from Smart City Extension." E3S Web of Conferences 188 (2020): 00007. http://dx.doi.org/10.1051/e3sconf/202018800007.
Full textZhang, Ling Juan. "Research of Engineering Spot Attendance and Employee Information Management Integration System." Advanced Materials Research 977 (June 2014): 472–75. http://dx.doi.org/10.4028/www.scientific.net/amr.977.472.
Full textHu, Zhong Xia. "Using IPv6 Technology to Construct Network Security System of Electronic Commerce." Advanced Materials Research 718-720 (July 2013): 1986–91. http://dx.doi.org/10.4028/www.scientific.net/amr.718-720.1986.
Full textChepkov, Ihor B., Valerii V. Zubariev, Oleksandr O. Sverhunov, and Oleksandr V. Zubariev. "Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems." Environmental safety and natural resources 30, no. 2 (July 3, 2019): 67–90. http://dx.doi.org/10.32347/2411-4049.2019.2.67-90.
Full textSamchyshyn, O. V., and D. V. Perevizna. "ANALYSIS OF TYPES OF USER’S IDENTIFICATION AND ADVANTAGES OF USER’S ATRIBUTE IDENTIFICATION BY QR-CODE." Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, no. 18 (December 30, 2020): 111–20. http://dx.doi.org/10.46972/2076-1546.2020.18.11.
Full text