Статті в журналах з теми "Security systems Mathematics"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security systems Mathematics".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Hwang, Suk Geun. "Matrix polytope and speech security systems." Korean Journal of Computational & Applied Mathematics 2, no. 2 (September 1995): 3–12. http://dx.doi.org/10.1007/bf03008959.
Повний текст джерелаShevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Svitlana Spasiteleva. "MATHEMATICAL METHODS IN CIBERNETIC SECURITY: GRAPHS AND THEIR APPLICATION IN INFORMATION AND CYBERNETIC SECURITY." Cybersecurity: Education, Science, Technique 1, no. 13 (2021): 133–44. http://dx.doi.org/10.28925/2663-4023.2021.13.133144.
Повний текст джерелаBokova, Oksana, Irina Drovnikova, Andrei Etepnev, Evgeniy Rogozin, and Victor Khvostov. "Methods of Estimating Reliability of Information Security Systems which Protect from Unauthorized Access in Automated Systems." SPIIRAS Proceedings 18, no. 6 (November 29, 2019): 1301–32. http://dx.doi.org/10.15622/sp.2019.18.6.1301-1332.
Повний текст джерелаStyugin, Mikhail A., and Alexey A. Kytmanov. "Mathematical Modeling of User Perception in Information Security Systems." Journal of Siberian Federal University. Mathematics & Physics 8, no. 4 (December 2015): 454–66. http://dx.doi.org/10.17516/1997-1397-2015-8-4-454-466.
Повний текст джерелаAra, Anees. "Privacy Preservation in Cloud Based Cyber Physical Systems." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4320–27. http://dx.doi.org/10.1166/jctn.2019.8520.
Повний текст джерелаBin-Faisal, Sajid, Dip Nandi, and Mashiour Rahman. "Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication." International Journal of Information Technology and Computer Science 14, no. 2 (April 8, 2022): 17–30. http://dx.doi.org/10.5815/ijitcs.2022.02.02.
Повний текст джерелаAdebayo, Olawale Surajudeen, Bashir Sulaimon Adebayo, Monday Jubril Abdullah, Omale Samuel Enemona, and Lateefah Abdulazeez. "Development of an Electronic Secure Students’ Industrial Works Experience Scheme Placement System." International Journal of Information Technology and Computer Science 14, no. 2 (April 8, 2022): 31–44. http://dx.doi.org/10.5815/ijitcs.2022.02.03.
Повний текст джерелаGadsby, D., P. Twigg, N. Bowring, and I. Williams. "Ultra Wideband Positioning for Intelligent Security Systems." Measurement and Control 39, no. 4 (May 2006): 108–13. http://dx.doi.org/10.1177/002029400603900401.
Повний текст джерелаStefantsov, D. A. "Implementation of security policies in programming informationprocessing systems." Prikladnaya diskretnaya matematika, no. 13 (September 1, 2011): 55–64. http://dx.doi.org/10.17223/20710410/13/4.
Повний текст джерелаMamatkazin, Ilya R. "SYSTEMS OF LAW AND FUNCTIONAL EQUIVALENTS IN SOCIAL SECURITY LAW." Proceedings of the Institute of State and Law of the RAS 17, no. 2 (April 29, 2022): 75–98. http://dx.doi.org/10.35427/2073-4522-2022-17-2-mamatkazin.
Повний текст джерелаZhang, Zhenyu, Anas Chaaban, and Lutz Lampe. "Physical layer security in light-fidelity systems." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 378, no. 2169 (March 2, 2020): 20190193. http://dx.doi.org/10.1098/rsta.2019.0193.
Повний текст джерелаBalyuk, Aleksey, and Oleg Finko. "INFORMATION SECURITY OF CYBER-PHYSICAL SYSTEMS: AUTHENTICATION OF DIGITAL TWINS." Voprosy kiberbezopasnosti, no. 5(51) (2022): 100–113. http://dx.doi.org/10.21681/2311-3456-2022-5-100-113.
Повний текст джерелаYazov, Yury, Sergey Soloviev, and Mikhail Tarelkin. "Logical-Linguistic Modeling of Security Threats Information in Information Systems." Voprosy kiberbezopasnosti, no. 4(50) (2022): 13–25. http://dx.doi.org/10.21681/2311-3456-2022-4-13-25.
Повний текст джерелаÖğüt, Hulisi. "The configuration and detection strategies for information security systems." Computers & Mathematics with Applications 65, no. 9 (May 2013): 1234–53. http://dx.doi.org/10.1016/j.camwa.2012.05.015.
Повний текст джерелаXu, Li, Elisa Bertino, and Yi Mu. "Security of new generation computing systems." Concurrency and Computation: Practice and Experience 26, no. 8 (September 12, 2013): 1475–76. http://dx.doi.org/10.1002/cpe.3128.
Повний текст джерелаLangar, Mahjoub, Mohamed Mejri, and Kamel Adi. "Formal enforcement of security policies on concurrent systems." Journal of Symbolic Computation 46, no. 9 (September 2011): 997–1016. http://dx.doi.org/10.1016/j.jsc.2011.05.003.
Повний текст джерелаEt. al., Rohit Chawla,. "Study of Security Threats and Challenges in Internet of Things Systems." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 1154–66. http://dx.doi.org/10.17762/turcomat.v12i2.1137.
Повний текст джерелаRajawat, Anand Singh, Pradeep Bedi, S. B. Goyal, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Adel R. Alharbi, and Amer Aljaedi. "Securing 5G-IoT Device Connectivity and Coverage Using Boltzmann Machine Keys Generation." Mathematical Problems in Engineering 2021 (October 8, 2021): 1–10. http://dx.doi.org/10.1155/2021/2330049.
Повний текст джерелаLee, Adrian J., Laura A. McLay, and Sheldon H. Jacobson. "Designing Aviation Security Passenger Screening Systems Using Nonlinear Control." SIAM Journal on Control and Optimization 48, no. 4 (January 2009): 2085–105. http://dx.doi.org/10.1137/070707014.
Повний текст джерелаEt. al., Zakoldaev D. A. ,. "Confidentiality assurance in Multi-agent Robotic System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 2659–63. http://dx.doi.org/10.17762/turcomat.v12i2.2283.
Повний текст джерелаSun, Ling, and Dali Gao. "Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming." Mathematical Problems in Engineering 2022 (March 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/3141568.
Повний текст джерелаAndrade, Roberto, Iván Ortiz, María Cazares, Gustavo Navas, and María Isabel Sánchez-Pazmiño. "Defining Cyber Risk Scenarios to Evaluate IoT Systems." Games 14, no. 1 (December 20, 2022): 1. http://dx.doi.org/10.3390/g14010001.
Повний текст джерелаKachanov, M. A. "SECURITY ANALYSIS OF INFORMATION FLOWS IN GNU/LINUX OPERATING SYSTEMS." Prikladnaya diskretnaya matematika, no. 9 (September 1, 2010): 77–89. http://dx.doi.org/10.17223/20710410/9/7.
Повний текст джерелаKruglikov, Sergey, Sergey Kasanin, and Yuri Kuleshov. "Methodical Approach to the Complex Description of Information Protection Object." Voprosy kiberbezopasnosti, no. 4(50) (2022): 39–51. http://dx.doi.org/10.21681/2311-3456-2022-4-39-51.
Повний текст джерелаYang, Qian, Hui-Ming Wang, Yi Zhang, and Zhu Han. "Physical Layer Security in MIMO Backscatter Wireless Systems." IEEE Transactions on Wireless Communications 15, no. 11 (November 2016): 7547–60. http://dx.doi.org/10.1109/twc.2016.2604800.
Повний текст джерелаZhang, Baowen, Xiao Chang, and Jianhua Li. "A Generalized Information Security Model SOCMD for CMD Systems." Chinese Journal of Electronics 29, no. 3 (May 1, 2020): 417–26. http://dx.doi.org/10.1049/cje.2020.02.017.
Повний текст джерелаGermanova, Svetlana E., Vadim G. Pliushchikov, Tatiana V. Magdeeva, Tatiana A. Ryzhova, and Nikolay V. Petukhov. "Environmental security issues in mining areas." Revista de la Universidad del Zulia 13, no. 36 (December 30, 2021): 323–38. http://dx.doi.org/10.46925//rdluz.36.21.
Повний текст джерелаZhao, R., G. H. Qin, H. P. Chen, J. Qin, and J. Yan. "Security-Aware Scheduling for FlexRay-Based Real-Time Automotive Systems." Mathematical Problems in Engineering 2019 (June 13, 2019): 1–17. http://dx.doi.org/10.1155/2019/4130756.
Повний текст джерелаBertozzi, Andrea L., Shane D. Johnson, and Michael J. Ward. "Mathematical modelling of crime and security: Special Issue of EJAM." European Journal of Applied Mathematics 27, no. 3 (April 28, 2016): 311–16. http://dx.doi.org/10.1017/s0956792516000176.
Повний текст джерелаSoewito, Benfano, and Ning Weng. "Concurrent workload mapping for multicore security systems." Concurrency and Computation: Practice and Experience 21, no. 10 (July 2009): 1281–306. http://dx.doi.org/10.1002/cpe.1423.
Повний текст джерелаMartin, Tania, Dimitrios Geneiatakis, Ioannis Kounelis, Stéphanie Kerckhof, and Igor Nai Fovino. "Towards a Formal IoT Security Model." Symmetry 12, no. 8 (August 5, 2020): 1305. http://dx.doi.org/10.3390/sym12081305.
Повний текст джерелаEt. al., G. Ravi Kumar,. "Security and Privacy Protection in Datamining." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 1313–18. http://dx.doi.org/10.17762/turcomat.v12i2.1218.
Повний текст джерелаSarumi, J. A., O. B. Longe, and F. O. Adelodun. "An Empirical Evaluation of the Effectiveness of the Computer-Based Network Security and Firewall in Banking Systems." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 1 (January 30, 2022): 21–31. http://dx.doi.org/10.22624/aims/maths/v10n1p3.
Повний текст джерелаObregón-Pulido, G., A. Torres-González, R. Cárdenas-Rodríguez, and G. Solís-Perales. "Encryption in Chaotic Systems with Sinusoidal Excitations." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/782629.
Повний текст джерелаTripathy, Asis Kumar, Tapan Kumar Das, and Navaneethan C. "Data cryptography based on musical notes on a fingerboard along with a dice." Indonesian Journal of Electrical Engineering and Computer Science 14, no. 3 (June 1, 2019): 1286. http://dx.doi.org/10.11591/ijeecs.v14.i3.pp1286-1290.
Повний текст джерелаEt.al, E. Shirisha. "IOT Based Home Security And Automation Using Google Assistant." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 11, 2021): 117–22. http://dx.doi.org/10.17762/turcomat.v12i6.1275.
Повний текст джерелаHutter, Dieter, Heiko Mantel, Ina Schaefer, and Axel Schairer. "Security of multi-agent systems: A case study on comparison shopping." Journal of Applied Logic 5, no. 2 (June 2007): 303–32. http://dx.doi.org/10.1016/j.jal.2005.12.015.
Повний текст джерелаLei, Min, Guang Meng, and Zhengjin Feng. "Security analysis of chaotic communication systems based on Volterra–Wiener–Korenberg model." Chaos, Solitons & Fractals 28, no. 1 (April 2006): 264–70. http://dx.doi.org/10.1016/j.chaos.2005.05.040.
Повний текст джерелаBai, Jian, Zhuo Zhang, and Bingshen Shen. "Internet of vehicles security situation awareness based on intrusion detection protection systems." Journal of Computational Methods in Sciences and Engineering 22, no. 1 (January 26, 2022): 189–95. http://dx.doi.org/10.3233/jcm-215889.
Повний текст джерелаSmith, Derek H., Richard P. Ward, and Stephanie Perkins. "Gold codes, Hadamard partitions and the security of CDMA systems." Designs, Codes and Cryptography 51, no. 3 (December 19, 2008): 231–43. http://dx.doi.org/10.1007/s10623-008-9257-8.
Повний текст джерелаBukin, Alexander, Alexander Samonov, and Edward Tihonov. "DETECTING INFORMATION SECURITY INCIDENTS BASED ON NEURAL NETwORK TECHNOLOGY." Voprosy kiberbezopasnosti, no. 5(51) (2022): 61–73. http://dx.doi.org/10.21681/2311-3456-2022-5-61-73.
Повний текст джерелаAhanger, Tariq Ahamed, Usman Tariq, Atef Ibrahim, Imdad Ullah, Yassine Bouteraa, and Fayez Gebali. "Securing IoT-Empowered Fog Computing Systems: Machine Learning Perspective." Mathematics 10, no. 8 (April 14, 2022): 1298. http://dx.doi.org/10.3390/math10081298.
Повний текст джерелаXu, Weifeng, Bin Yu, Liguo Weng, and Jianguo Zhou. "Security-Based Asynchronous Control for Discrete-Time Markov Switching Power Systems ⋆." Mathematical Problems in Engineering 2022 (May 5, 2022): 1–11. http://dx.doi.org/10.1155/2022/2779623.
Повний текст джерелаJ. Gokulraj, J. Deepika,. "Internet of Things Device Enabled Smart Home Integrated Architecture with Security Services." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2614–23. http://dx.doi.org/10.17762/turcomat.v12i6.5708.
Повний текст джерелаChang, Ping-Teng, and Kuo-Chen Hung. "Applying the fuzzy-weighted-average approach to evaluate network security systems." Computers & Mathematics with Applications 49, no. 11-12 (June 2005): 1797–814. http://dx.doi.org/10.1016/j.camwa.2004.10.042.
Повний текст джерелаMuhammad, Aina’u Shehu, and Fatih Özkaynak. "SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs." Symmetry 13, no. 5 (May 8, 2021): 824. http://dx.doi.org/10.3390/sym13050824.
Повний текст джерелаSavić, Dušan, Dejan Simić, and Siniša Vlajić. "Extended Software Architecture Based on Security Patterns." Informatica 21, no. 2 (January 1, 2010): 229–46. http://dx.doi.org/10.15388/informatica.2010.285.
Повний текст джерелаZHANG, YI-SHAN, and HSIAO-DONG CHIANG. "LOCAL BIFURCATION BOUNDARY AND STEADY-STATE SECURITY BOUNDARY IN LARGE ELECTRIC POWER SYSTEMS: NUMERICAL STUDIES." International Journal of Bifurcation and Chaos 21, no. 03 (March 2011): 647–62. http://dx.doi.org/10.1142/s0218127411028878.
Повний текст джерелаEt.al, Ahmad Faiz Ghazali. "A Survey of Malware Risk Detection Techniques in Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 868–76. http://dx.doi.org/10.17762/turcomat.v12i3.797.
Повний текст джерелаHe, Anping, Jinzhao Wu, Shihan Yang, Yongquan Zhou, and Juan Wang. "Automata-Based Analysis of Stage Suspended Boom Systems." Journal of Applied Mathematics 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/739253.
Повний текст джерела