Artículos de revistas sobre el tema "Mathematical data- Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Mathematical data- Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Nurhidayati, Rika y Salauddin Muis. "Analysis Of Voice Data Security Security By Using The Rc4 Algorithm". Jurnal Info Sains : Informatika dan Sains 11, n.º 2 (1 de septiembre de 2021): 22–28. http://dx.doi.org/10.54209/infosains.v11i2.44.
Texto completoErkayev, Husan Ahmadaliyevich. "MATHEMATICAL MODEL OF CRYPTOGRAPHICAL HISTORICAL CODE ALGORITHMS TO DATA SECURITY." Theoretical & Applied Science 89, n.º 09 (30 de septiembre de 2020): 30–33. http://dx.doi.org/10.15863/tas.2020.09.89.8.
Texto completoSaksonov, E. A. "Method of Depersonalization of Personal Data". INFORMACIONNYE TEHNOLOGII 27, n.º 6 (9 de junio de 2021): 314–21. http://dx.doi.org/10.17587/it.27.314-321.
Texto completoHub, Miloslav y Agnès Kateřina Příhodová. "Impact of Globalisation on Data Security – Authentication Issues". SHS Web of Conferences 92 (2021): 05009. http://dx.doi.org/10.1051/shsconf/20219205009.
Texto completoHorubała, Aleksandra, Daniel Waszkiewicz, Michał Andrzejczak y Piotr Sapiecha. "Data confidentiality and computations hiding in cloud services for public administration". Computer Science and Mathematical Modelling, n.º 7/2018 (18 de julio de 2018): 11–18. http://dx.doi.org/10.5604/01.3001.0012.2001.
Texto completoBolshakov, A. S., A. I. Zhila y A. V. Osin. "FUZZY LOGIC DATA PROTECTION MANAGEMENT". H&ES Research 13, n.º 4 (2021): 37–47. http://dx.doi.org/10.36724/2409-5419-2021-13-4-37-47.
Texto completoHenge, Santosh Kumar, Gitanjali Jayaraman, M. Sreedevi, R. Rajakumar, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai y Ahmed Saeed AlGhamdi. "Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology". Networks and Heterogeneous Media 18, n.º 3 (2023): 1313–34. http://dx.doi.org/10.3934/nhm.2023057.
Texto completoRaj, A. Samson Arun, R. Venkatesan, S. Malathi, V. D. Ambeth Kumar, E. Thenmozhi, Anbarasu Dhandapani, M. Ashok Kumar y B. Chitra. "A Mathematical Queuing Model Analysis Using Secure Data Authentication Framework for Modern Healthcare Applications". Journal of Sensors 2022 (16 de septiembre de 2022): 1–15. http://dx.doi.org/10.1155/2022/8397635.
Texto completoLiu, Yutang y Qin Zhang. "Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology". Journal of Function Spaces 2022 (2 de agosto de 2022): 1–10. http://dx.doi.org/10.1155/2022/4292063.
Texto completoBoychenko, O. V. y D. V. Ivanyuta. "INFORMATION SECURITY MODELS". Construction economic and environmental management 80, n.º 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.
Texto completoSutrisno, Agus, Aang Nuryaman, Muslim Ansori y Ahmad Faisol. "Image Cryptography Based On A Second-Order QRT Difference Equation". International Journal of Mathematical, Engineering and Management Sciences 7, n.º 3 (8 de mayo de 2022): 399–416. http://dx.doi.org/10.33889/ijmems.2022.7.3.027.
Texto completoImankulova, B., S. Alpar y S. Amanzholova. "DATA SECURITY, MODELING AND VISUALIZATION OF DATA FROM IOT DEVICES". Scientific Journal of Astana IT University 10 (30 de junio de 2022): 107–18. http://dx.doi.org/10.37943/acwt2121.
Texto completoKhandare, Snehal D. y Dr Shubhada S. Thakare. "Video Steganography Based on Modified Data Protection Scheme". International Journal for Research in Applied Science and Engineering Technology 11, n.º 8 (31 de agosto de 2023): 876–84. http://dx.doi.org/10.22214/ijraset.2023.55251.
Texto completoAljazaery, Ibtisam A., Haider Th Salim Alrikabi y Mustafa Rabea Aziz. "Combination of Hiding and Encryption for Data Security". International Journal of Interactive Mobile Technologies (iJIM) 14, n.º 09 (17 de junio de 2020): 34. http://dx.doi.org/10.3991/ijim.v14i09.14173.
Texto completoSantoso, Yogi Suryo. "Message Security Using a Combination of Hill Cipher and RSA Algorithms". Jurnal Matematika Dan Ilmu Pengetahuan Alam LLDikti Wilayah 1 (JUMPA) 1, n.º 1 (30 de marzo de 2021): 20–28. http://dx.doi.org/10.54076/jumpa.v1i1.38.
Texto completoPoltavtseva, Maria. "Active Monitoring Model as a Basis for Security Management of Industrial CPS". Voprosy kiberbezopasnosti, n.º 2(42) (2021): 51–60. http://dx.doi.org/10.21681/2311-3456-2021-2-51-60.
Texto completoKapopara, Eeva N. y Dr Prashant P. Pittalia. "A proposed approach for the key generation in cryptography to enrich the data confidentiality while sharing data over the network". Journal of Artificial Intelligence, Machine Learning and Neural Network, n.º 24 (31 de julio de 2022): 26–32. http://dx.doi.org/10.55529/jaimlnn.24.26.32.
Texto completoAkhramovich, Volodymyr. "METHOD OF CALCULATING THE PROTECTION OF PERSONAL DATA FROM THE NETWORK CLUSTERING FACTOR". Cybersecurity: Education, Science, Technique 2, n.º 14 (2021): 36–49. http://dx.doi.org/10.28925/2663-4023.2021.14.3649.
Texto completoKazakova, Nataliya. "Predictive Financial Security Analytics Using Industry Paradigm and Big Data Technology". Auditor 8, n.º 12 (6 de febrero de 2023): 37–43. http://dx.doi.org/10.12737/1998-0701-2022-8-12-37-43.
Texto completoIdris, Samwal, Anjali Mathur y Asdaque Hussain. "Novel Enhanced Algorithm Based on DNA Cryptography to Secure Data Transfer over Network". Journal of Physics: Conference Series 2040, n.º 1 (1 de octubre de 2021): 012047. http://dx.doi.org/10.1088/1742-6596/2040/1/012047.
Texto completoLe, Ngoc Thuy y Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security". Journal of Telecommunications and the Digital Economy 7, n.º 1 (30 de marzo de 2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Texto completoLin, Xiuchun. "Network Security Technology of Supply Chain Management Based on Internet of Things and Big Data". Computational Intelligence and Neuroscience 2022 (21 de junio de 2022): 1–12. http://dx.doi.org/10.1155/2022/7753086.
Texto completoHRYTSUN, Viktoriia. "STATISTICAL SECURITY OF ECONOMIC MANAGEMENT". Herald of Khmelnytskyi National University. Economic sciences 318, n.º 3 (25 de mayo de 2023): 180–85. http://dx.doi.org/10.31891/2307-5740-2023-318-3-28.
Texto completoDormidontov, A. V., L. V. Mironova y V. S. Mironov. "POSSIBILITY OF THE MATHEMATICAL MODEL OF COUNTERACTION APPLICATION TO THE ASSESSMENT OF TRANSPORT INFRASTRUCTURE SECURITY LEVEL". Civil Aviation High TECHNOLOGIES 21, n.º 3 (3 de julio de 2018): 67–77. http://dx.doi.org/10.26467/2079-0619-2018-21-3-67-77.
Texto completoAkhramovych, Volodymyr. "Method of calculating of the information in social networks protection depending on the number of communities". Collection "Information Technology and Security" 11, n.º 1 (29 de junio de 2023): 15–26. http://dx.doi.org/10.20535/2411-1031.2023.11.1.279868.
Texto completoMilian, Yanuar Chris y Wiwin Sulistyo. "Model Pengembangan Keamanan Data dengan Algoritma ROT 13 Extended Vernam Cipher dan Stream Cipher". Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, n.º 2 (1 de abril de 2023): 208–16. http://dx.doi.org/10.35870/jtik.v7i2.716.
Texto completoSetti, Sunil, Indra Gunawan, Bahrudi Efendi Damanik, Sumarno Sumarno y Ika Okta Kirana. "Implementasi Algoritma Advanced Encryption Standard dalam Pengamanan Data Penjualan Ramayana Department Store". JURIKOM (Jurnal Riset Komputer) 7, n.º 1 (15 de febrero de 2020): 182. http://dx.doi.org/10.30865/jurikom.v7i1.1960.
Texto completoYang, Min. "Information Security Risk Management Model for Big Data". Advances in Multimedia 2022 (8 de agosto de 2022): 1–10. http://dx.doi.org/10.1155/2022/3383251.
Texto completoMazur, Katarzyna, Bogdan Ksiezopolski y Adam Wierzbicki. "On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers". Mathematical Problems in Engineering 2015 (2015): 1–19. http://dx.doi.org/10.1155/2015/418535.
Texto completoGlushchenko, L. A., V. A. Golovkov, M. G. Karin, K. K. Morgunov y V. I. Tupota. "Mathematical model of security of the information circulating in the open optical data link channel". Optical Memory and Neural Networks 19, n.º 4 (diciembre de 2010): 338–43. http://dx.doi.org/10.3103/s1060992x10040120.
Texto completoLukova-Chuiko, N. V., O. A. Laptev, O. V. Barabash, A. P. Musienko y V. M. Akhramovich. "THE METHOD OF CALCULATION OF PERSONAL DATA PROTECTION ON THE BASIS OF A SET OF SPECIFIC PARAMETERS OF SOCIAL NETWORKS". Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, n.º 76 (2022): 54–68. http://dx.doi.org/10.17721/2519-481x/2022/76-05.
Texto completoKotenko, Igor y Igor Parashchuk. "Multi-criteria security assessment of control and diagnostic data on the technological processes". MATEC Web of Conferences 298 (2019): 00071. http://dx.doi.org/10.1051/matecconf/201929800071.
Texto completoSiregar, Al Zimy. "Implementation Of ADFGVX Cipher And RSA On TXT And Doc File Security". Journal Basic Science and Technology 10, n.º 3 (30 de octubre de 2021): 105–10. http://dx.doi.org/10.35335/jbst.v10i3.1764.
Texto completoBertozzi, Andrea L., Shane D. Johnson y Michael J. Ward. "Mathematical modelling of crime and security: Special Issue of EJAM". European Journal of Applied Mathematics 27, n.º 3 (28 de abril de 2016): 311–16. http://dx.doi.org/10.1017/s0956792516000176.
Texto completoSmirnova, Galina I. y Maria E. Listopad. "Economic and Mathematical Modeling of Russia’s Economic Security in the Period Under Sanctions". Economic Strategies 152 (25 de marzo de 2020): 32–39. http://dx.doi.org/10.33917/es-2.168.2020.32-39.
Texto completoPham, Hai, Rainer Steinwandt y Adriana Suárez Corona. "Integrating Classical Preprocessing into an Optical Encryption Scheme". Entropy 21, n.º 9 (7 de septiembre de 2019): 872. http://dx.doi.org/10.3390/e21090872.
Texto completoSemenov, Serhii, Zhang Liqiang, Cao Weiling y Viacheslav Davydov. "Development a mathematical model for the software security testing first stage". Eastern-European Journal of Enterprise Technologies 3, n.º 2 (111) (30 de junio de 2021): 24–34. http://dx.doi.org/10.15587/1729-4061.2021.233417.
Texto completoSyahir, Ahmad y Chuah Chai Wen. "Secure Login Mechanism for Online Banking". JOIV : International Journal on Informatics Visualization 2, n.º 3-2 (6 de junio de 2018): 179. http://dx.doi.org/10.30630/joiv.2.3-2.136.
Texto completoLachikhina, A. B. y A. A. Petrakov. "Data integrity as a criterion for assessing the security of corporate information systems resources". Issues of radio electronics, n.º 11 (20 de noviembre de 2019): 77–81. http://dx.doi.org/10.21778/2218-5453-2019-11-77-81.
Texto completoVORONIN, EVGENY A., SERGEY V. KOZLOV y ALEXANDER N. KUBANKOV. "IDENTIFICATION OF THREATS BASED ON A LIMITED SET OF DATA IN THE ASSESSMENT SECURITY SYSTEMS AND MEASURES FOR THEIR IMPLEMENTATION". H&ES Research 14, n.º 3 (2022): 41–48. http://dx.doi.org/10.36724/2409-5419-2022-14-3-41-48.
Texto completoYang, Ai Wen. "The Evaluation Model Analysis on Credit Crisis Based on Data Mining and Nonlinear Regression Method". Applied Mechanics and Materials 427-429 (septiembre de 2013): 2898–902. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2898.
Texto completoHossain, Md Alam, Ahsan Ul-Ambia, Nazmul Hossain, Mustafizur Rahman Akhond, Nasim Adnan y Sayed Md Galib. "Mathematical Solution of ULTE Based Salt Generation Password Based Key Derivation Function (PBKDF)". American Journal of Agricultural Science, Engineering, and Technology 6, n.º 2 (7 de julio de 2022): 8–17. http://dx.doi.org/10.54536/ajaset.v6i2.368.
Texto completoKotenko, Igor Vitalievich y Igor Borisovich Parashchuk. "Model of security information and event management system". Vestnik of Astrakhan State Technical University. Series: Management, computer science and informatics 2020, n.º 2 (30 de abril de 2020): 84–94. http://dx.doi.org/10.24143/2072-9502-2020-2-84-94.
Texto completoTao, Q., Q. Chen, H. Ding, I. Adnan, X. Huang y X. Cui. "Cross-Department Secures Data Sharing in Food Industry via Blockchain-Cloud Fusion Scheme". Security and Communication Networks 2021 (27 de marzo de 2021): 1–18. http://dx.doi.org/10.1155/2021/6668339.
Texto completoAkhramovych, Volodymyr, German Shuklin, Yuriy Pepa, Tetiana Muzhanova y Serhii Zozulia. "Devising a procedure to determine the level of informational space security in social networks considering interrelations among users". Eastern-European Journal of Enterprise Technologies 1, n.º 9(115) (28 de febrero de 2022): 63–74. http://dx.doi.org/10.15587/1729-4061.2022.252135.
Texto completoFeng, Feng, Xiabing Zhou, Bin Li y Qinglei Zhou. "Modelling the Mimic Defence Technology for Multimedia Cloud Servers". Security and Communication Networks 2020 (27 de noviembre de 2020): 1–22. http://dx.doi.org/10.1155/2020/8819958.
Texto completoVivchar, Oksana. "SPECIFIC FEATURES OF ECONOMIC SECURITY ASSESSMENT OF ENTERPRISES UNDER CURRENT CONDITIONS OF BUSINESS MACROTRENDS: A REGIONAL APPROACH". Regional’ni aspekti rozvitku produktivnih sil Ukraїni, n.º 24 (2019): 15–23. http://dx.doi.org/10.35774/rarrpsu2019.24.015.
Texto completoAulia, Rachmat, Haida Dafitri, Bayu Irwandi y Rizko Liza. "Penerapan Algoritma Vertical Bit Rotation Dalam Pengamanan Data Sekolah". Building of Informatics, Technology and Science (BITS) 3, n.º 4 (31 de marzo de 2022): 713–18. http://dx.doi.org/10.47065/bits.v3i4.1340.
Texto completoSuwarjono, Suwarjono, Lilik Sumaryanti y Lusia Lamalewa. "Cryptography Implementation for electronic voting security". E3S Web of Conferences 328 (2021): 03005. http://dx.doi.org/10.1051/e3sconf/202132803005.
Texto completoSnishchenko, R. H., V. I. Hrynchutskyi, Yu M. Nikolchuk, O. O. Lopatovska y L. M. Krot. "Financial security of macro regions in the period of military aggression". Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu, n.º 4 (agosto de 2023): 157–63. http://dx.doi.org/10.33271/nvngu/2023-4/157.
Texto completo