Journal articles on the topic 'Software and hardware protection methods'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Software and hardware protection methods.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
He, Gao Ming. "Research on Protection Methods of Embedded Operating System Software Based on Hardware Compiler." Applied Mechanics and Materials 443 (October 2013): 556–60. http://dx.doi.org/10.4028/www.scientific.net/amm.443.556.
Full textMamarajabov Odil Elmurzayevich. "Cloud technology to ensure the protection of fundamental methods and use of information." International Journal on Integrated Education 3, no. 10 (October 30, 2020): 313–15. http://dx.doi.org/10.31149/ijie.v3i10.780.
Full textSidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (August 10, 2019): 42. http://dx.doi.org/10.3390/jsan8030042.
Full textBawane, Manjiri R., Madhavi S. Borkar, Payal R. Wawarkar, Sanika M. Shende, Heena K. Chandel, and Ketki R. Bhakare. "USB Key Based Antipiracy Solution." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 2 (February 28, 2015): 12–17. http://dx.doi.org/10.53555/nncse.v2i2.507.
Full textBorovikov, Aleksey, Oleg Maslov, Stepan Mordvinov, and Andrei Esafiev. "Increasing Hardware-Software Platforms Trust Levels to Prevent Exploiting BIOS Vulnerabilities." Voprosy kiberbezopasnosti, no. 6(46) (2021): 68–77. http://dx.doi.org/10.21681/2311-3456-2021-6-68-77.
Full textAlekseev, V. V., V. A. Gridnev, A. V. Yakovlev, O. S. Mashkova, U. A. Savilova, D. A. Shibkov, and D. A. Yakovleva. "A System Approach to the Construction of the Software and Hardware Complex for Training Information Security Specialists." Vestnik Tambovskogo gosudarstvennogo tehnicheskogo universiteta 27, no. 1 (2021): 020–30. http://dx.doi.org/10.17277/vestnik.2021.01.pp.020-030.
Full textLobyzov, Viktor, and Vadim Shevtsov. "The concept of a Hardware-Software System for Protecting IIoT Devices." NBI Technologies, no. 2 (October 2021): 16–21. http://dx.doi.org/10.15688/nbit.jvolsu.2021.2.3.
Full textWu, Zongbo, Wenhui Xiao, Han Deng, and Lan Yang. "Research on data privacy protection methods based on genome-wide association study." International Journal of Embedded Systems 15, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijes.2022.122105.
Full textDeng, Han, Lan Yang, Zongbo Wu, and Wenhui Xiao. "Research on data privacy protection methods based on genome-wide association study." International Journal of Embedded Systems 15, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijes.2022.10046007.
Full textTian, Hong Lei, Jian Feng Liu, Yong Kuan Liu, Yuan Fang, Wen Huai Chen, and Liang Gao. "The Research on Relay Protection Settings On-Line Verification System Application in Smart Grid." Advanced Materials Research 1070-1072 (December 2014): 1378–83. http://dx.doi.org/10.4028/www.scientific.net/amr.1070-1072.1378.
Full textSTETSIUK, MYKOLA, and ANTONINA KASHTALIAN. "THE METHODS OF ENSURING FAULT TOLERANCE, SURVIVABILITY AND PROTECTION OF INFORMATION OF SPECIALIZED INFORMATION TECHNOLOGIES UNDER THE INFLUENCE OF MALICIOUS SOFTWARE." Computer systems and information technologies, no. 1 (April 14, 2022): 36–44. http://dx.doi.org/10.31891/csit-2022-1-5.
Full textTsmots, I. G., V. M. Teslyuk, Yu V. Opotiak, R. V. Parcei, and R. V. Zinko. "The basic architecture of mobile robotic platform with intelligent motion control system and data transmission protection." Ukrainian Journal of Information Technology 3, no. 2 (November 23, 2021): 74–80. http://dx.doi.org/10.23939/ujit2021.02.074.
Full textKubkina, O. V., and V. G. Lysenko. "Automation of ac electric-traction NetWare digital protective relay operational control." Journal of Physics: Conference Series 2131, no. 4 (December 1, 2021): 042066. http://dx.doi.org/10.1088/1742-6596/2131/4/042066.
Full textNovash, I. V. "MODELING OF POWER SYSTEMS AND TESTING OF RELAY PROTECTION DEVICES IN REAL AND MODEL TIME." ENERGETIKA. Proceedings of CIS higher education institutions and power engineering associations 60, no. 3 (May 17, 2017): 198–210. http://dx.doi.org/10.21122/1029-7448-2017-60-3-198-210.
Full textVitomsky, E. V., and D. N. Somov. "Methods for protecting local wireless network aimed at providing temporary silency of signals and information interaction structure." Issues of radio electronics, no. 3 (April 26, 2020): 35–40. http://dx.doi.org/10.21778/2218-5453-2020-3-35-40.
Full textQian, Han Ming, Ping Sun, and Hong Tao Zhao. "A Design Proposal of Integrated PC-Architecture Embedded Control System for Remotely Operated Weapon Station." Advanced Materials Research 424-425 (January 2012): 881–84. http://dx.doi.org/10.4028/www.scientific.net/amr.424-425.881.
Full textSharif, Uzair, Daniel Mueller-Gritschneder, and Ulf Schlichtmann. "REPAIR: Control Flow Protection based on Register Pairing Updates for SW-Implemented HW Fault Tolerance." ACM Transactions on Embedded Computing Systems 20, no. 5s (October 31, 2021): 1–22. http://dx.doi.org/10.1145/3477001.
Full textMirzabaev, Alisher, and Alexander Samonov. "Control Method of the Correct Execution of Programs by Monitoring and Analyzing the Route-Time Parameters of the Computing Process." Voprosy kiberbezopasnosti, no. 2(48) (2022): 63–71. http://dx.doi.org/10.21681/2311-3456-2022-2-63-71.
Full textRumapea, Mazmur Septian. "Perlindungan Hukum Terhadap Penggelapan Uang Elektronik Dalam Transaksi Elektronik." Jurnal Hukum Kaidah: Media Komunikasi dan Informasi Hukum dan Masyarakat 18, no. 3 (April 15, 2019): 27–39. http://dx.doi.org/10.30743/jhk.v18i3.1185.
Full textTolіupa, Serhii, Oleksandr Pliushch, and Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.
Full textYu, Qiang, Peng Fei Yu, Hui Huang, Wei Chen, Jie Ren, and Zhi Huang. "Design of Dual PON-MAC ONU Dedicated for Communication System of Power Distribution and Utilization." Applied Mechanics and Materials 391 (September 2013): 528–31. http://dx.doi.org/10.4028/www.scientific.net/amm.391.528.
Full textNiu, Xiao Peng, Qing Bao Li, and Xiao Dong Xie. "The Research of Hiding Technology of Hardware Trojan in Chip." Applied Mechanics and Materials 446-447 (November 2013): 876–81. http://dx.doi.org/10.4028/www.scientific.net/amm.446-447.876.
Full textDesnitsky, V., and A. Meleshko. "SECURITY ANALYSIS OF SOFTWARE AND HARDWARE COMPONENTS IN WIRELESS SENSOR NETWORKS." Telecom IT 7, no. 1 (2019): 75–83. http://dx.doi.org/10.31854/2307-1303-2019-7-1-75-83.
Full textZhang, Jing Jing. "Research and Summary on Reliability of Relay Protection System." Advanced Materials Research 433-440 (January 2012): 6755–59. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.6755.
Full textGolovacheva, Natalia. "Methods of Developing Recommendations for Improving the Security of Information Systems." NBI Technologies, no. 3 (March 2021): 18–22. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.3.
Full textDongak, B. S., A. S. Shatohin, and R. V. Meshcheryakov. "The effectiveness of the Centralized Use of Digital Technologies, Information Resources and Information Protection Tools in Government by the Example of the Republic of Tyva." Proceedings of the Southwest State University 23, no. 6 (February 23, 2020): 99–114. http://dx.doi.org/10.21869/2223-1560-2019-23-6-99-114.
Full textSurinsky, Dmitry, and Ilya Shchinnikov. "Trends in the development of the direction of electroderatization." АгроЭкоИнфо 7, Special (November 24, 2021): 2. http://dx.doi.org/10.51419/20217002.
Full textDergachov, Konstantin, Leonid Krasnov, Vladislav Bilozerskyi, and Anatoly Zymovin. "Methods and algorithms for protecting information in optical text recognition systems." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 1 (February 23, 2022): 154–69. http://dx.doi.org/10.32620/reks.2022.1.12.
Full textM., Vardhana, and Anil Kumar Bhat. "VLSI Implementation and Software Co-Simulation of Digital Image Watermarking with Increased Security." International Journal of Sensors, Wireless Communications and Control 10, no. 4 (December 18, 2020): 634–38. http://dx.doi.org/10.2174/2210327909666190319150314.
Full textChugunov, Mikhail V., Irina N. Polunina, Alexander G. Divin, Aleksandra A. Generalova, Artem A. Nikulin, and Dmitriy S. Bychkov. "Integrated Mobile Robotic Platform Model." Engineering Technologies and Systems 31, no. 4 (December 30, 2021): 609–27. http://dx.doi.org/10.15507/2658-4123.031.202104.609-627.
Full textWang, Xin, Bo WAN, Wei Zhou, Huaitong Niu, and Sibo Feng. "Research on technical scheme for multi type load resource information access." Journal of Physics: Conference Series 2189, no. 1 (February 1, 2022): 012030. http://dx.doi.org/10.1088/1742-6596/2189/1/012030.
Full textLinz, A., D. Brunner, J. Fehrmann, T. Herlitzius, R. Keicher, A. Ruckelshausen, and H. P. Schwarz. "Modelling environment for an electrical driven selective sprayer robot in orchards." Advances in Animal Biosciences 8, no. 2 (June 1, 2017): 848–53. http://dx.doi.org/10.1017/s2040470017000723.
Full textIvanov, Artem, Igor Kolosov, Vadim Danyk, Sergey Voronenko, Yurii Lebedenko, and Hanna Rudakova. "DESIGN OF MULTIFUNCTION SIMULATOR FOR ENGINE ROOM PERSONNEL TRAINING." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 10, no. 2 (June 30, 2020): 62–69. http://dx.doi.org/10.35784/iapgos.1617.
Full textAbubakar, M. A. T., A. Aloysius, Z. Umar, and M. Dauda. "Comparative Analysis of Some Efficient Data Security Methods among Cryptographic Techniques for Cloud Data Security." Nigerian Journal of Basic and Applied Sciences 27, no. 1 (May 26, 2020): 81–88. http://dx.doi.org/10.4314/njbas.v27i1.11.
Full textNemchinov, S. G., V. A. Harevskiy, Yu I. Gorban, and S. G. Tsarichenko. "https://www.btpnadzor.ru/archive/protivopozharnaya-zashchita-mashinnykh-zalov-atomnykh-elektrostantsiy-s-ispolzovaniem-mnogofunktsionalnykh-robototekhnicheskikh-kompleksov." Occupational Safety in Industry, no. 2 (February 2022): 20–26. http://dx.doi.org/10.24000/0409-2961-2022-2-20-26.
Full textRani, Rajneesh, and Harpreet Singh. "Fingerprint Presentation Attack Detection Using Transfer Learning Approach." International Journal of Intelligent Information Technologies 17, no. 1 (January 2021): 53–67. http://dx.doi.org/10.4018/ijiit.2021010104.
Full textAnfinogenov, M. V., and I. S. Antyasov. "EVOLUTION OF INFORMATION SECURITY SYSTEMS IN VIDEO GAMES." Journal of the Ural Federal District. Information security 20, no. 3 (2020): 59–68. http://dx.doi.org/10.14529/secur200307.
Full textJones, Michael, Matthew Johnson, Mark Shervey, Joel T. Dudley, and Noah Zimmerman. "Privacy-Preserving Methods for Feature Engineering Using Blockchain: Review, Evaluation, and Proof of Concept." Journal of Medical Internet Research 21, no. 8 (August 14, 2019): e13600. http://dx.doi.org/10.2196/13600.
Full textПетручук, Е., Evgeniy Petruchuk, Д. Иванов, and Donat Ivanov. "ORGANIZATION OF INFORMATION EXCHANGE IN DECENTRALIZED SWARM CONTROL SYSTEMS OF MULTI-ROBOTIC COMPLEXES USING ZIGBEE." Bulletin of Belgorod State Technological University named after. V. G. Shukhov 4, no. 7 (July 21, 2019): 140–57. http://dx.doi.org/10.34031/article_5d35d0b6de2bb4.43911446.
Full textAl-Mohair, Hani K., and Hussien A. Alhadadd. "Design an Improved System to Control the Computer Temperature." International Journal of Systems Applications, Engineering & Development 15 (December 29, 2021): 234–39. http://dx.doi.org/10.46300/91015.2021.15.35.
Full textKOHDA, TAKEHISA, and KOICHI INOUE. "SAFETY ASSESSMENT MODEL OF SOFTWARE FOR FAILURE DIAGNOSIS SYSTEMS." International Journal of Reliability, Quality and Safety Engineering 06, no. 01 (March 1999): 81–89. http://dx.doi.org/10.1142/s0218539399000097.
Full textSowah, Robert A., Kwaku Apeadu, Francis Gatsi, Kwame O. Ampadu, and Baffour S. Mensah. "Hardware Module Design and Software Implementation of Multisensor Fire Detection and Notification System Using Fuzzy Logic and Convolutional Neural Networks (CNNs)." Journal of Engineering 2020 (February 1, 2020): 1–16. http://dx.doi.org/10.1155/2020/3645729.
Full textRyzhkov, Igor Victorovych. "SECONDARY INFORMATION PROCESSING METHODS WHILE ESTIMATING THE SPATIAL ORIENTATION OF OBJECTS." Applied Aspects of Information Technology 3, no. 4 (November 20, 2020): 221–31. http://dx.doi.org/10.15276/aait.04.2020.1.
Full textChen, Xing, Umit Ogras, and Chaitali Chakrabarti. "Probabilistic Risk-Aware Scheduling with Deadline Constraint for Heterogeneous SoCs." ACM Transactions on Embedded Computing Systems 21, no. 2 (March 31, 2022): 1–27. http://dx.doi.org/10.1145/3489409.
Full textАdiljanova, S. A., G. A. Тulepberdinova, M. J. Sakypbekova, and N. A. Тekesbayeva. "ANALYSIS OF MATHEMATICAL METHODS OF MULTI-CRITERIA OPTIMIZATION AND DYNAMIC MANAGEMENT OF CYBERSECURITY RESOURCES OF INFORMATIZATION OBJECTS." BULLETIN Series of Physics & Mathematical Sciences 72, no. 4 (September 29, 2020): 162–67. http://dx.doi.org/10.51889/2020-4.1728-7901.25.
Full textKHISAMOV, A. Kh. "REMOTE CONFIRMATION OF IDENTITY TO PERFORM LEGALLY SIGNIFICANT ACTIONS IN PROCEDURAL RELATIONS." Herald of Civil Procedure 12, no. 1 (April 15, 2022): 236–47. http://dx.doi.org/10.24031/2226-0781-2022-12-1-236-247.
Full textGordova, Yuliana, Olga Herzen, Andrey Herzen, and Silvia Kostovska. "Usage of cartographic methods in place-name study (history of the problem and actual research)." InterCarto. InterGIS 27, no. 4 (2021): 520–36. http://dx.doi.org/10.35595/2414-9179-2021-4-27-520-536.
Full textMoskovchenko, Valeriy, Mikhail Gudkov, and Oleg Lauta. "Robotechnical System for Analyzing Cyber-Security of Information Communication Systems and Networks." NBI Technologies, no. 2 (February 2018): 30–38. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.5.
Full textLi, Han, Krishnamurty Muralidhar, Rathindra Sarathy, and Xin (Robert) Luo. "Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation." Journal of Database Management 25, no. 2 (April 2014): 52–74. http://dx.doi.org/10.4018/jdm.2014040103.
Full textHaggag, Said. "Vibration analysis for predictive maintenance and improved reliability of rotating machines in ETRR-2 research reactor." Kerntechnik 87, no. 1 (February 1, 2022): 125–34. http://dx.doi.org/10.1515/kern-2020-0036.
Full text