Journal articles on the topic 'Security systems Mathematics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security systems Mathematics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hwang, Suk Geun. "Matrix polytope and speech security systems." Korean Journal of Computational & Applied Mathematics 2, no. 2 (September 1995): 3–12. http://dx.doi.org/10.1007/bf03008959.
Full textShevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Svitlana Spasiteleva. "MATHEMATICAL METHODS IN CIBERNETIC SECURITY: GRAPHS AND THEIR APPLICATION IN INFORMATION AND CYBERNETIC SECURITY." Cybersecurity: Education, Science, Technique 1, no. 13 (2021): 133–44. http://dx.doi.org/10.28925/2663-4023.2021.13.133144.
Full textBokova, Oksana, Irina Drovnikova, Andrei Etepnev, Evgeniy Rogozin, and Victor Khvostov. "Methods of Estimating Reliability of Information Security Systems which Protect from Unauthorized Access in Automated Systems." SPIIRAS Proceedings 18, no. 6 (November 29, 2019): 1301–32. http://dx.doi.org/10.15622/sp.2019.18.6.1301-1332.
Full textStyugin, Mikhail A., and Alexey A. Kytmanov. "Mathematical Modeling of User Perception in Information Security Systems." Journal of Siberian Federal University. Mathematics & Physics 8, no. 4 (December 2015): 454–66. http://dx.doi.org/10.17516/1997-1397-2015-8-4-454-466.
Full textAra, Anees. "Privacy Preservation in Cloud Based Cyber Physical Systems." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4320–27. http://dx.doi.org/10.1166/jctn.2019.8520.
Full textBin-Faisal, Sajid, Dip Nandi, and Mashiour Rahman. "Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication." International Journal of Information Technology and Computer Science 14, no. 2 (April 8, 2022): 17–30. http://dx.doi.org/10.5815/ijitcs.2022.02.02.
Full textAdebayo, Olawale Surajudeen, Bashir Sulaimon Adebayo, Monday Jubril Abdullah, Omale Samuel Enemona, and Lateefah Abdulazeez. "Development of an Electronic Secure Students’ Industrial Works Experience Scheme Placement System." International Journal of Information Technology and Computer Science 14, no. 2 (April 8, 2022): 31–44. http://dx.doi.org/10.5815/ijitcs.2022.02.03.
Full textGadsby, D., P. Twigg, N. Bowring, and I. Williams. "Ultra Wideband Positioning for Intelligent Security Systems." Measurement and Control 39, no. 4 (May 2006): 108–13. http://dx.doi.org/10.1177/002029400603900401.
Full textStefantsov, D. A. "Implementation of security policies in programming informationprocessing systems." Prikladnaya diskretnaya matematika, no. 13 (September 1, 2011): 55–64. http://dx.doi.org/10.17223/20710410/13/4.
Full textMamatkazin, Ilya R. "SYSTEMS OF LAW AND FUNCTIONAL EQUIVALENTS IN SOCIAL SECURITY LAW." Proceedings of the Institute of State and Law of the RAS 17, no. 2 (April 29, 2022): 75–98. http://dx.doi.org/10.35427/2073-4522-2022-17-2-mamatkazin.
Full textZhang, Zhenyu, Anas Chaaban, and Lutz Lampe. "Physical layer security in light-fidelity systems." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 378, no. 2169 (March 2, 2020): 20190193. http://dx.doi.org/10.1098/rsta.2019.0193.
Full textBalyuk, Aleksey, and Oleg Finko. "INFORMATION SECURITY OF CYBER-PHYSICAL SYSTEMS: AUTHENTICATION OF DIGITAL TWINS." Voprosy kiberbezopasnosti, no. 5(51) (2022): 100–113. http://dx.doi.org/10.21681/2311-3456-2022-5-100-113.
Full textYazov, Yury, Sergey Soloviev, and Mikhail Tarelkin. "Logical-Linguistic Modeling of Security Threats Information in Information Systems." Voprosy kiberbezopasnosti, no. 4(50) (2022): 13–25. http://dx.doi.org/10.21681/2311-3456-2022-4-13-25.
Full textÖğüt, Hulisi. "The configuration and detection strategies for information security systems." Computers & Mathematics with Applications 65, no. 9 (May 2013): 1234–53. http://dx.doi.org/10.1016/j.camwa.2012.05.015.
Full textXu, Li, Elisa Bertino, and Yi Mu. "Security of new generation computing systems." Concurrency and Computation: Practice and Experience 26, no. 8 (September 12, 2013): 1475–76. http://dx.doi.org/10.1002/cpe.3128.
Full textLangar, Mahjoub, Mohamed Mejri, and Kamel Adi. "Formal enforcement of security policies on concurrent systems." Journal of Symbolic Computation 46, no. 9 (September 2011): 997–1016. http://dx.doi.org/10.1016/j.jsc.2011.05.003.
Full textEt. al., Rohit Chawla,. "Study of Security Threats and Challenges in Internet of Things Systems." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 1154–66. http://dx.doi.org/10.17762/turcomat.v12i2.1137.
Full textRajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Adel R. Alharbi, and Amer Aljaedi. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation." Mathematical Problems in Engineering 2021 (October 8, 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.
Full textLee, Adrian J., Laura A. McLay, and Sheldon H. Jacobson. "Designing Aviation Security Passenger Screening Systems Using Nonlinear Control." SIAM Journal on Control and Optimization 48, no. 4 (January 2009): 2085–105. http://dx.doi.org/10.1137/070707014.
Full textEt. al., Zakoldaev D. A. ,. "Confidentiality assurance in Multi-agent Robotic System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 2659–63. http://dx.doi.org/10.17762/turcomat.v12i2.2283.
Full textSun, Ling, and Dali Gao. "Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming." Mathematical Problems in Engineering 2022 (March 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/3141568.
Full textAndrade, Roberto, Iván Ortiz, María Cazares, Gustavo Navas, and María Isabel Sánchez-Pazmiño. "Defining Cyber Risk Scenarios to Evaluate IoT Systems." Games 14, no. 1 (December 20, 2022): 1. http://dx.doi.org/10.3390/g14010001.
Full textKachanov, M. A. "SECURITY ANALYSIS OF INFORMATION FLOWS IN GNU/LINUX OPERATING SYSTEMS." Prikladnaya diskretnaya matematika, no. 9 (September 1, 2010): 77–89. http://dx.doi.org/10.17223/20710410/9/7.
Full textKruglikov, Sergey, Sergey Kasanin, and Yuri Kuleshov. "Methodical Approach to the Complex Description of Information Protection Object." Voprosy kiberbezopasnosti, no. 4(50) (2022): 39–51. http://dx.doi.org/10.21681/2311-3456-2022-4-39-51.
Full textYang, Qian, Hui-Ming Wang, Yi Zhang, and Zhu Han. "Physical Layer Security in MIMO Backscatter Wireless Systems." IEEE Transactions on Wireless Communications 15, no. 11 (November 2016): 7547–60. http://dx.doi.org/10.1109/twc.2016.2604800.
Full textZhang, Baowen, Xiao Chang, and Jianhua Li. "A Generalized Information Security Model SOCMD for CMD Systems." Chinese Journal of Electronics 29, no. 3 (May 1, 2020): 417–26. http://dx.doi.org/10.1049/cje.2020.02.017.
Full textGermanova, Svetlana E., Vadim G. Pliushchikov, Tatiana V. Magdeeva, Tatiana A. Ryzhova, and Nikolay V. Petukhov. "Environmental security issues in mining areas." Revista de la Universidad del Zulia 13, no. 36 (December 30, 2021): 323–38. http://dx.doi.org/10.46925//rdluz.36.21.
Full textZhao, R., G. H. Qin, H. P. Chen, J. Qin, and J. Yan. "Security-Aware Scheduling for FlexRay-Based Real-Time Automotive Systems." Mathematical Problems in Engineering 2019 (June 13, 2019): 1–17. http://dx.doi.org/10.1155/2019/4130756.
Full textBertozzi, Andrea L., Shane D. Johnson, and Michael J. Ward. "Mathematical modelling of crime and security: Special Issue of EJAM." European Journal of Applied Mathematics 27, no. 3 (April 28, 2016): 311–16. http://dx.doi.org/10.1017/s0956792516000176.
Full textSoewito, Benfano, and Ning Weng. "Concurrent workload mapping for multicore security systems." Concurrency and Computation: Practice and Experience 21, no. 10 (July 2009): 1281–306. http://dx.doi.org/10.1002/cpe.1423.
Full textMartin, Tania, Dimitrios Geneiatakis, Ioannis Kounelis, Stéphanie Kerckhof, and Igor Nai Fovino. "Towards a Formal IoT Security Model." Symmetry 12, no. 8 (August 5, 2020): 1305. http://dx.doi.org/10.3390/sym12081305.
Full textEt. al., G. Ravi Kumar,. "Security and Privacy Protection in Datamining." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 1313–18. http://dx.doi.org/10.17762/turcomat.v12i2.1218.
Full textSarumi, J. A., O. B. Longe, and F. O. Adelodun. "An Empirical Evaluation of the Effectiveness of the Computer-Based Network Security and Firewall in Banking Systems." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 1 (January 30, 2022): 21–31. http://dx.doi.org/10.22624/aims/maths/v10n1p3.
Full textObregón-Pulido, G., A. Torres-González, R. Cárdenas-Rodríguez, and G. Solís-Perales. "Encryption in Chaotic Systems with Sinusoidal Excitations." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/782629.
Full textTripathy, Asis Kumar, Tapan Kumar Das, and Navaneethan C. "Data cryptography based on musical notes on a fingerboard along with a dice." Indonesian Journal of Electrical Engineering and Computer Science 14, no. 3 (June 1, 2019): 1286. http://dx.doi.org/10.11591/ijeecs.v14.i3.pp1286-1290.
Full textEt.al, E. Shirisha. "IOT Based Home Security And Automation Using Google Assistant." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 11, 2021): 117–22. http://dx.doi.org/10.17762/turcomat.v12i6.1275.
Full textHutter, Dieter, Heiko Mantel, Ina Schaefer, and Axel Schairer. "Security of multi-agent systems: A case study on comparison shopping." Journal of Applied Logic 5, no. 2 (June 2007): 303–32. http://dx.doi.org/10.1016/j.jal.2005.12.015.
Full textLei, Min, Guang Meng, and Zhengjin Feng. "Security analysis of chaotic communication systems based on Volterra–Wiener–Korenberg model." Chaos, Solitons & Fractals 28, no. 1 (April 2006): 264–70. http://dx.doi.org/10.1016/j.chaos.2005.05.040.
Full textBai, Jian, Zhuo Zhang, and Bingshen Shen. "Internet of vehicles security situation awareness based on intrusion detection protection systems." Journal of Computational Methods in Sciences and Engineering 22, no. 1 (January 26, 2022): 189–95. http://dx.doi.org/10.3233/jcm-215889.
Full textSmith, Derek H., Richard P. Ward, and Stephanie Perkins. "Gold codes, Hadamard partitions and the security of CDMA systems." Designs, Codes and Cryptography 51, no. 3 (December 19, 2008): 231–43. http://dx.doi.org/10.1007/s10623-008-9257-8.
Full textBukin, Alexander, Alexander Samonov, and Edward Tihonov. "DETECTING INFORMATION SECURITY INCIDENTS BASED ON NEURAL NETwORK TECHNOLOGY." Voprosy kiberbezopasnosti, no. 5(51) (2022): 61–73. http://dx.doi.org/10.21681/2311-3456-2022-5-61-73.
Full textAhanger, Tariq Ahamed, Usman Tariq, Atef Ibrahim, Imdad Ullah, Yassine Bouteraa, and Fayez Gebali. "Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective." Mathematics 10, no. 8 (April 14, 2022): 1298. http://dx.doi.org/10.3390/math10081298.
Full textXu, Weifeng, Bin Yu, Liguo Weng, and Jianguo Zhou. "Security-Based Asynchronous Control for Discrete-Time Markov Switching Power Systems ⋆." Mathematical Problems in Engineering 2022 (May 5, 2022): 1–11. http://dx.doi.org/10.1155/2022/2779623.
Full textJ. Gokulraj, J. Deepika,. "Internet of Things Device Enabled Smart Home Integrated Architecture with Security Services." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2614–23. http://dx.doi.org/10.17762/turcomat.v12i6.5708.
Full textChang, Ping-Teng, and Kuo-Chen Hung. "Applying the fuzzy-weighted-average approach to evaluate network security systems." Computers & Mathematics with Applications 49, no. 11-12 (June 2005): 1797–814. http://dx.doi.org/10.1016/j.camwa.2004.10.042.
Full textMuhammad, Aina’u Shehu, and Fatih Özkaynak. "SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs." Symmetry 13, no. 5 (May 8, 2021): 824. http://dx.doi.org/10.3390/sym13050824.
Full textSavić, Dušan, Dejan Simić, and Siniša Vlajić. "Extended Software Architecture Based on Security Patterns." Informatica 21, no. 2 (January 1, 2010): 229–46. http://dx.doi.org/10.15388/informatica.2010.285.
Full textZHANG, YI-SHAN, and HSIAO-DONG CHIANG. "LOCAL BIFURCATION BOUNDARY AND STEADY-STATE SECURITY BOUNDARY IN LARGE ELECTRIC POWER SYSTEMS: NUMERICAL STUDIES." International Journal of Bifurcation and Chaos 21, no. 03 (March 2011): 647–62. http://dx.doi.org/10.1142/s0218127411028878.
Full textEt.al, Ahmad Faiz Ghazali. "A Survey of Malware Risk Detection Techniques in Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 868–76. http://dx.doi.org/10.17762/turcomat.v12i3.797.
Full textHe, Anping, Jinzhao Wu, Shihan Yang, Yongquan Zhou, and Juan Wang. "Automata-Based Analysis of Stage Suspended Boom Systems." Journal of Applied Mathematics 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/739253.
Full text