Статті в журналах з теми "Software and hardware protection methods"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Software and hardware protection methods".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
He, Gao Ming. "Research on Protection Methods of Embedded Operating System Software Based on Hardware Compiler." Applied Mechanics and Materials 443 (October 2013): 556–60. http://dx.doi.org/10.4028/www.scientific.net/amm.443.556.
Повний текст джерелаMamarajabov Odil Elmurzayevich. "Cloud technology to ensure the protection of fundamental methods and use of information." International Journal on Integrated Education 3, no. 10 (October 30, 2020): 313–15. http://dx.doi.org/10.31149/ijie.v3i10.780.
Повний текст джерелаSidhu, Simranjeet, Bassam J. Mohd, and Thaier Hayajneh. "Hardware Security in IoT Devices with Emphasis on Hardware Trojans." Journal of Sensor and Actuator Networks 8, no. 3 (August 10, 2019): 42. http://dx.doi.org/10.3390/jsan8030042.
Повний текст джерелаBawane, Manjiri R., Madhavi S. Borkar, Payal R. Wawarkar, Sanika M. Shende, Heena K. Chandel, and Ketki R. Bhakare. "USB Key Based Antipiracy Solution." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 2 (February 28, 2015): 12–17. http://dx.doi.org/10.53555/nncse.v2i2.507.
Повний текст джерелаBorovikov, Aleksey, Oleg Maslov, Stepan Mordvinov, and Andrei Esafiev. "Increasing Hardware-Software Platforms Trust Levels to Prevent Exploiting BIOS Vulnerabilities." Voprosy kiberbezopasnosti, no. 6(46) (2021): 68–77. http://dx.doi.org/10.21681/2311-3456-2021-6-68-77.
Повний текст джерелаAlekseev, V. V., V. A. Gridnev, A. V. Yakovlev, O. S. Mashkova, U. A. Savilova, D. A. Shibkov, and D. A. Yakovleva. "A System Approach to the Construction of the Software and Hardware Complex for Training Information Security Specialists." Vestnik Tambovskogo gosudarstvennogo tehnicheskogo universiteta 27, no. 1 (2021): 020–30. http://dx.doi.org/10.17277/vestnik.2021.01.pp.020-030.
Повний текст джерелаLobyzov, Viktor, and Vadim Shevtsov. "The concept of a Hardware-Software System for Protecting IIoT Devices." NBI Technologies, no. 2 (October 2021): 16–21. http://dx.doi.org/10.15688/nbit.jvolsu.2021.2.3.
Повний текст джерелаWu, Zongbo, Wenhui Xiao, Han Deng, and Lan Yang. "Research on data privacy protection methods based on genome-wide association study." International Journal of Embedded Systems 15, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijes.2022.122105.
Повний текст джерелаDeng, Han, Lan Yang, Zongbo Wu, and Wenhui Xiao. "Research on data privacy protection methods based on genome-wide association study." International Journal of Embedded Systems 15, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijes.2022.10046007.
Повний текст джерелаTian, Hong Lei, Jian Feng Liu, Yong Kuan Liu, Yuan Fang, Wen Huai Chen, and Liang Gao. "The Research on Relay Protection Settings On-Line Verification System Application in Smart Grid." Advanced Materials Research 1070-1072 (December 2014): 1378–83. http://dx.doi.org/10.4028/www.scientific.net/amr.1070-1072.1378.
Повний текст джерелаSTETSIUK, MYKOLA, and ANTONINA KASHTALIAN. "THE METHODS OF ENSURING FAULT TOLERANCE, SURVIVABILITY AND PROTECTION OF INFORMATION OF SPECIALIZED INFORMATION TECHNOLOGIES UNDER THE INFLUENCE OF MALICIOUS SOFTWARE." Computer systems and information technologies, no. 1 (April 14, 2022): 36–44. http://dx.doi.org/10.31891/csit-2022-1-5.
Повний текст джерелаTsmots, I. G., V. M. Teslyuk, Yu V. Opotiak, R. V. Parcei, and R. V. Zinko. "The basic architecture of mobile robotic platform with intelligent motion control system and data transmission protection." Ukrainian Journal of Information Technology 3, no. 2 (November 23, 2021): 74–80. http://dx.doi.org/10.23939/ujit2021.02.074.
Повний текст джерелаKubkina, O. V., and V. G. Lysenko. "Automation of ac electric-traction NetWare digital protective relay operational control." Journal of Physics: Conference Series 2131, no. 4 (December 1, 2021): 042066. http://dx.doi.org/10.1088/1742-6596/2131/4/042066.
Повний текст джерелаNovash, I. V. "MODELING OF POWER SYSTEMS AND TESTING OF RELAY PROTECTION DEVICES IN REAL AND MODEL TIME." ENERGETIKA. Proceedings of CIS higher education institutions and power engineering associations 60, no. 3 (May 17, 2017): 198–210. http://dx.doi.org/10.21122/1029-7448-2017-60-3-198-210.
Повний текст джерелаVitomsky, E. V., and D. N. Somov. "Methods for protecting local wireless network aimed at providing temporary silency of signals and information interaction structure." Issues of radio electronics, no. 3 (April 26, 2020): 35–40. http://dx.doi.org/10.21778/2218-5453-2020-3-35-40.
Повний текст джерелаQian, Han Ming, Ping Sun, and Hong Tao Zhao. "A Design Proposal of Integrated PC-Architecture Embedded Control System for Remotely Operated Weapon Station." Advanced Materials Research 424-425 (January 2012): 881–84. http://dx.doi.org/10.4028/www.scientific.net/amr.424-425.881.
Повний текст джерелаSharif, Uzair, Daniel Mueller-Gritschneder, and Ulf Schlichtmann. "REPAIR: Control Flow Protection based on Register Pairing Updates for SW-Implemented HW Fault Tolerance." ACM Transactions on Embedded Computing Systems 20, no. 5s (October 31, 2021): 1–22. http://dx.doi.org/10.1145/3477001.
Повний текст джерелаMirzabaev, Alisher, and Alexander Samonov. "Control Method of the Correct Execution of Programs by Monitoring and Analyzing the Route-Time Parameters of the Computing Process." Voprosy kiberbezopasnosti, no. 2(48) (2022): 63–71. http://dx.doi.org/10.21681/2311-3456-2022-2-63-71.
Повний текст джерелаRumapea, Mazmur Septian. "Perlindungan Hukum Terhadap Penggelapan Uang Elektronik Dalam Transaksi Elektronik." Jurnal Hukum Kaidah: Media Komunikasi dan Informasi Hukum dan Masyarakat 18, no. 3 (April 15, 2019): 27–39. http://dx.doi.org/10.30743/jhk.v18i3.1185.
Повний текст джерелаTolіupa, Serhii, Oleksandr Pliushch, and Ivan Parkhomenko. "CONSTRUCTION OF ATTACK DETECTION SYSTEMS IN INFORMATION NETWORKS ON NEURAL NETWORK STRUCTURES." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 169–83. http://dx.doi.org/10.28925/2663-4023.2020.10.169183.
Повний текст джерелаYu, Qiang, Peng Fei Yu, Hui Huang, Wei Chen, Jie Ren, and Zhi Huang. "Design of Dual PON-MAC ONU Dedicated for Communication System of Power Distribution and Utilization." Applied Mechanics and Materials 391 (September 2013): 528–31. http://dx.doi.org/10.4028/www.scientific.net/amm.391.528.
Повний текст джерелаNiu, Xiao Peng, Qing Bao Li, and Xiao Dong Xie. "The Research of Hiding Technology of Hardware Trojan in Chip." Applied Mechanics and Materials 446-447 (November 2013): 876–81. http://dx.doi.org/10.4028/www.scientific.net/amm.446-447.876.
Повний текст джерелаDesnitsky, V., and A. Meleshko. "SECURITY ANALYSIS OF SOFTWARE AND HARDWARE COMPONENTS IN WIRELESS SENSOR NETWORKS." Telecom IT 7, no. 1 (2019): 75–83. http://dx.doi.org/10.31854/2307-1303-2019-7-1-75-83.
Повний текст джерелаZhang, Jing Jing. "Research and Summary on Reliability of Relay Protection System." Advanced Materials Research 433-440 (January 2012): 6755–59. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.6755.
Повний текст джерелаGolovacheva, Natalia. "Methods of Developing Recommendations for Improving the Security of Information Systems." NBI Technologies, no. 3 (March 2021): 18–22. http://dx.doi.org/10.15688/nbit.jvolsu.2020.3.3.
Повний текст джерелаDongak, B. S., A. S. Shatohin, and R. V. Meshcheryakov. "The effectiveness of the Centralized Use of Digital Technologies, Information Resources and Information Protection Tools in Government by the Example of the Republic of Tyva." Proceedings of the Southwest State University 23, no. 6 (February 23, 2020): 99–114. http://dx.doi.org/10.21869/2223-1560-2019-23-6-99-114.
Повний текст джерелаSurinsky, Dmitry, and Ilya Shchinnikov. "Trends in the development of the direction of electroderatization." АгроЭкоИнфо 7, Special (November 24, 2021): 2. http://dx.doi.org/10.51419/20217002.
Повний текст джерелаDergachov, Konstantin, Leonid Krasnov, Vladislav Bilozerskyi, and Anatoly Zymovin. "Methods and algorithms for protecting information in optical text recognition systems." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 1 (February 23, 2022): 154–69. http://dx.doi.org/10.32620/reks.2022.1.12.
Повний текст джерелаM., Vardhana, and Anil Kumar Bhat. "VLSI Implementation and Software Co-Simulation of Digital Image Watermarking with Increased Security." International Journal of Sensors, Wireless Communications and Control 10, no. 4 (December 18, 2020): 634–38. http://dx.doi.org/10.2174/2210327909666190319150314.
Повний текст джерелаChugunov, Mikhail V., Irina N. Polunina, Alexander G. Divin, Aleksandra A. Generalova, Artem A. Nikulin, and Dmitriy S. Bychkov. "Integrated Mobile Robotic Platform Model." Engineering Technologies and Systems 31, no. 4 (December 30, 2021): 609–27. http://dx.doi.org/10.15507/2658-4123.031.202104.609-627.
Повний текст джерелаWang, Xin, Bo WAN, Wei Zhou, Huaitong Niu, and Sibo Feng. "Research on technical scheme for multi type load resource information access." Journal of Physics: Conference Series 2189, no. 1 (February 1, 2022): 012030. http://dx.doi.org/10.1088/1742-6596/2189/1/012030.
Повний текст джерелаLinz, A., D. Brunner, J. Fehrmann, T. Herlitzius, R. Keicher, A. Ruckelshausen, and H. P. Schwarz. "Modelling environment for an electrical driven selective sprayer robot in orchards." Advances in Animal Biosciences 8, no. 2 (June 1, 2017): 848–53. http://dx.doi.org/10.1017/s2040470017000723.
Повний текст джерелаIvanov, Artem, Igor Kolosov, Vadim Danyk, Sergey Voronenko, Yurii Lebedenko, and Hanna Rudakova. "DESIGN OF MULTIFUNCTION SIMULATOR FOR ENGINE ROOM PERSONNEL TRAINING." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 10, no. 2 (June 30, 2020): 62–69. http://dx.doi.org/10.35784/iapgos.1617.
Повний текст джерелаAbubakar, M. A. T., A. Aloysius, Z. Umar, and M. Dauda. "Comparative Analysis of Some Efficient Data Security Methods among Cryptographic Techniques for Cloud Data Security." Nigerian Journal of Basic and Applied Sciences 27, no. 1 (May 26, 2020): 81–88. http://dx.doi.org/10.4314/njbas.v27i1.11.
Повний текст джерелаNemchinov, S. G., V. A. Harevskiy, Yu I. Gorban, and S. G. Tsarichenko. "https://www.btpnadzor.ru/archive/protivopozharnaya-zashchita-mashinnykh-zalov-atomnykh-elektrostantsiy-s-ispolzovaniem-mnogofunktsionalnykh-robototekhnicheskikh-kompleksov." Occupational Safety in Industry, no. 2 (February 2022): 20–26. http://dx.doi.org/10.24000/0409-2961-2022-2-20-26.
Повний текст джерелаRani, Rajneesh, and Harpreet Singh. "Fingerprint Presentation Attack Detection Using Transfer Learning Approach." International Journal of Intelligent Information Technologies 17, no. 1 (January 2021): 53–67. http://dx.doi.org/10.4018/ijiit.2021010104.
Повний текст джерелаAnfinogenov, M. V., and I. S. Antyasov. "EVOLUTION OF INFORMATION SECURITY SYSTEMS IN VIDEO GAMES." Journal of the Ural Federal District. Information security 20, no. 3 (2020): 59–68. http://dx.doi.org/10.14529/secur200307.
Повний текст джерелаJones, Michael, Matthew Johnson, Mark Shervey, Joel T. Dudley, and Noah Zimmerman. "Privacy-Preserving Methods for Feature Engineering Using Blockchain: Review, Evaluation, and Proof of Concept." Journal of Medical Internet Research 21, no. 8 (August 14, 2019): e13600. http://dx.doi.org/10.2196/13600.
Повний текст джерелаПетручук, Е., Evgeniy Petruchuk, Д. Иванов, and Donat Ivanov. "ORGANIZATION OF INFORMATION EXCHANGE IN DECENTRALIZED SWARM CONTROL SYSTEMS OF MULTI-ROBOTIC COMPLEXES USING ZIGBEE." Bulletin of Belgorod State Technological University named after. V. G. Shukhov 4, no. 7 (July 21, 2019): 140–57. http://dx.doi.org/10.34031/article_5d35d0b6de2bb4.43911446.
Повний текст джерелаAl-Mohair, Hani K., and Hussien A. Alhadadd. "Design an Improved System to Control the Computer Temperature." International Journal of Systems Applications, Engineering & Development 15 (December 29, 2021): 234–39. http://dx.doi.org/10.46300/91015.2021.15.35.
Повний текст джерелаKOHDA, TAKEHISA, and KOICHI INOUE. "SAFETY ASSESSMENT MODEL OF SOFTWARE FOR FAILURE DIAGNOSIS SYSTEMS." International Journal of Reliability, Quality and Safety Engineering 06, no. 01 (March 1999): 81–89. http://dx.doi.org/10.1142/s0218539399000097.
Повний текст джерелаSowah, Robert A., Kwaku Apeadu, Francis Gatsi, Kwame O. Ampadu, and Baffour S. Mensah. "Hardware Module Design and Software Implementation of Multisensor Fire Detection and Notification System Using Fuzzy Logic and Convolutional Neural Networks (CNNs)." Journal of Engineering 2020 (February 1, 2020): 1–16. http://dx.doi.org/10.1155/2020/3645729.
Повний текст джерелаRyzhkov, Igor Victorovych. "SECONDARY INFORMATION PROCESSING METHODS WHILE ESTIMATING THE SPATIAL ORIENTATION OF OBJECTS." Applied Aspects of Information Technology 3, no. 4 (November 20, 2020): 221–31. http://dx.doi.org/10.15276/aait.04.2020.1.
Повний текст джерелаChen, Xing, Umit Ogras, and Chaitali Chakrabarti. "Probabilistic Risk-Aware Scheduling with Deadline Constraint for Heterogeneous SoCs." ACM Transactions on Embedded Computing Systems 21, no. 2 (March 31, 2022): 1–27. http://dx.doi.org/10.1145/3489409.
Повний текст джерелаАdiljanova, S. A., G. A. Тulepberdinova, M. J. Sakypbekova, and N. A. Тekesbayeva. "ANALYSIS OF MATHEMATICAL METHODS OF MULTI-CRITERIA OPTIMIZATION AND DYNAMIC MANAGEMENT OF CYBERSECURITY RESOURCES OF INFORMATIZATION OBJECTS." BULLETIN Series of Physics & Mathematical Sciences 72, no. 4 (September 29, 2020): 162–67. http://dx.doi.org/10.51889/2020-4.1728-7901.25.
Повний текст джерелаKHISAMOV, A. Kh. "REMOTE CONFIRMATION OF IDENTITY TO PERFORM LEGALLY SIGNIFICANT ACTIONS IN PROCEDURAL RELATIONS." Herald of Civil Procedure 12, no. 1 (April 15, 2022): 236–47. http://dx.doi.org/10.24031/2226-0781-2022-12-1-236-247.
Повний текст джерелаGordova, Yuliana, Olga Herzen, Andrey Herzen, and Silvia Kostovska. "Usage of cartographic methods in place-name study (history of the problem and actual research)." InterCarto. InterGIS 27, no. 4 (2021): 520–36. http://dx.doi.org/10.35595/2414-9179-2021-4-27-520-536.
Повний текст джерелаMoskovchenko, Valeriy, Mikhail Gudkov, and Oleg Lauta. "Robotechnical System for Analyzing Cyber-Security of Information Communication Systems and Networks." NBI Technologies, no. 2 (February 2018): 30–38. http://dx.doi.org/10.15688/nbit.jvolsu.2018.2.5.
Повний текст джерелаLi, Han, Krishnamurty Muralidhar, Rathindra Sarathy, and Xin (Robert) Luo. "Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation." Journal of Database Management 25, no. 2 (April 2014): 52–74. http://dx.doi.org/10.4018/jdm.2014040103.
Повний текст джерелаHaggag, Said. "Vibration analysis for predictive maintenance and improved reliability of rotating machines in ETRR-2 research reactor." Kerntechnik 87, no. 1 (February 1, 2022): 125–34. http://dx.doi.org/10.1515/kern-2020-0036.
Повний текст джерела