Статті в журналах з теми "Threat of information leakage"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Threat of information leakage".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Wong, Wai Peng, Hwee Chin Tan, Kim Hua Tan, and Ming-Lang Tseng. "Human factors in information leakage: mitigation strategies for information sharing integrity." Industrial Management & Data Systems 119, no. 6 (July 8, 2019): 1242–67. http://dx.doi.org/10.1108/imds-12-2018-0546.
Повний текст джерелаShchelkin, Kirill E., and Gleb V. Popkov. "DETECTION OF INFORMATION LEAKAGE THREATS IN FIBER OPTICAL COMMUNICATION CHANNEL." Interexpo GEO-Siberia 6, no. 2 (July 8, 2020): 182–88. http://dx.doi.org/10.33764/2618-981x-2020-6-2-182-188.
Повний текст джерелаZatonatskiy, D., V. Marhasova, and N. Korogod. "INSIDER THREAT MANAGEMENT AS AN ELEMENT OF THE CORPORATE ECONOMIC SECURITY." Financial and credit activity: problems of theory and practice 1, no. 36 (February 17, 2021): 149–58. http://dx.doi.org/10.18371/fcaptp.v1i36.227690.
Повний текст джерелаDeshanta Ibnugraha, Prajna, Lukito Edi Nugroho, and Paulus Insap Santosa. "An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method." Bulletin of Electrical Engineering and Informatics 7, no. 3 (September 1, 2018): 393–99. http://dx.doi.org/10.11591/eei.v7i3.847.
Повний текст джерелаKuznecov, Fedor. "The threat of data leakage due to insufficient attention to information security." Russian Journal of Management 10, no. 1 (April 19, 2022): 126–30. http://dx.doi.org/10.29039/2409-6024-2022-10-1-126-130.
Повний текст джерелаSkryl, S. V., S. S. Nikulin, A. V. Mazin, V. I. Spivak, V. O. Krylov, and V. V. Nikulina. "Methodological aspects of the presentation of information security threats recognition signs in the context of improving technical intelligence." Radio industry (Russia) 30, no. 4 (December 23, 2020): 35–46. http://dx.doi.org/10.21778/2413-9599-2020-30-4-35-46.
Повний текст джерелаZhang, Jie, Xiao Dan Guan, Yan Sun, and Xue Jie Wei. "Study on Oil Pipeline Leakage Detection Based on Stress Wave Detection Technique and Wavelet Analysis." Advanced Materials Research 694-697 (May 2013): 1368–71. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.1368.
Повний текст джерелаAnjaria, Kushal, and Arun Mishra. "Quantitative analysis of information leakage in service-oriented architecture-based Web services." Kybernetes 46, no. 3 (March 6, 2017): 479–500. http://dx.doi.org/10.1108/k-07-2016-0178.
Повний текст джерелаMohammad Kootiani, A. Zadali, and P. Abedi. "Investigation Role of Sbox to Leakage DPA Information for TDES in FPGA Targets." Applied Mechanics and Materials 256-259 (December 2012): 2820–25. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2820.
Повний текст джерелаHu, Teng, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang. "Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats." Sensors 20, no. 18 (September 16, 2020): 5297. http://dx.doi.org/10.3390/s20185297.
Повний текст джерелаOzhiganova, Marina, Anastasia Kalita, and Yevgeny Tishchenko. "Building Adaptive Information Security Systems." NBI Technologies, no. 4 (February 2020): 12–21. http://dx.doi.org/10.15688/nbit.jvolsu.2019.4.2.
Повний текст джерелаRenaud, Karen, and Wendy Goucher. "Monkey See - Monkey Take Photo." International Journal of Cyber Warfare and Terrorism 3, no. 4 (October 2013): 40–51. http://dx.doi.org/10.4018/ijcwt.2013100105.
Повний текст джерелаChoi, Donghee, Dohoon Kim, and Seog Park. "A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems." Computational and Mathematical Methods in Medicine 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/265132.
Повний текст джерелаZeng, Zhen, and Jiajia Zhang. "Based on the Role of Internet of Things Security in the Management of Enterprise Human Resource Information Leakage." Wireless Communications and Mobile Computing 2021 (October 5, 2021): 1–12. http://dx.doi.org/10.1155/2021/5936390.
Повний текст джерелаLifshits, Pavel, Roni Forte, Yedid Hoshen, Matt Halpern, Manuel Philipose, Mohit Tiwari, and Mark Silberstein. "Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 141–58. http://dx.doi.org/10.1515/popets-2018-0036.
Повний текст джерелаV. Grishachev, Vladimir. "Detecting Threats of Acoustic Information Leakage Through Fiber Optic Communications." Journal of Information Security 03, no. 02 (2012): 149–55. http://dx.doi.org/10.4236/jis.2012.32017.
Повний текст джерелаRogozin, E. A., R. E. Rogozin, D. G. Silka, I. D. Korobkin, and M. O. Meshcheryakov. "Investigation of side electromagnetic radiation generated during the operation of devices with sensory input of information." Herald of Dagestan State Technical University. Technical Sciences 48, no. 3 (November 9, 2021): 83–92. http://dx.doi.org/10.21822/2073-6185-2021-48-3-83-92.
Повний текст джерелаSeo, Sang, and Dohoon Kim. "Study on Inside Threats Based on Analytic Hierarchy Process." Symmetry 12, no. 8 (July 29, 2020): 1255. http://dx.doi.org/10.3390/sym12081255.
Повний текст джерелаCasati, Luca, and Andrea Visconti. "The Dangers of Rooting: Data Leakage Detection in Android Applications." Mobile Information Systems 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/6020461.
Повний текст джерелаZhang, Pu Han, Jing Zhe Li, Shuai Shao, and Peng Wang. "PDroid: Detecting Privacy Leakage on Android." Applied Mechanics and Materials 556-562 (May 2014): 2658–62. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.2658.
Повний текст джерелаKang, Haiyan, Yanhang Xiao, and Jie Yin. "An Intelligent Detection Method of Personal Privacy Disclosure for Social Networks." Security and Communication Networks 2021 (April 23, 2021): 1–11. http://dx.doi.org/10.1155/2021/5518220.
Повний текст джерелаChristos P, Beretas. "Industrial control systems: The biggest cyber threat." Annals of Civil and Environmental Engineering 4, no. 1 (December 4, 2020): 044–46. http://dx.doi.org/10.29328/journal.acee.1001026.
Повний текст джерелаKhandare, Miss Komal K. "Various Privacy and Security Issues in Online Social Networks." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 142–46. http://dx.doi.org/10.22214/ijraset.2021.39203.
Повний текст джерелаSkryl, S. V., A. V. Mazin, T. V. Meshcheryakova, A. V. Kalach, M. V. Ponomarev, and O. A. Gulyaev. "Prevention of information leakage through channels of spurious electromagnetic radiation and interference: research models." Radio industry (Russia) 31, no. 2 (July 7, 2021): 22–34. http://dx.doi.org/10.21778/2413-9599-2021-31-2-22-34.
Повний текст джерелаWu, Bingzhe, Chaochao Chen, Shiwan Zhao, Cen Chen, Yuan Yao, Guangyu Sun, Li Wang, Xiaolu Zhang, and Jun Zhou. "Characterizing Membership Privacy in Stochastic Gradient Langevin Dynamics." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 6372–79. http://dx.doi.org/10.1609/aaai.v34i04.6107.
Повний текст джерелаKorochentsev, D., L. Cherckesova, and P. Razumov. "Development of a software tool for identification of information security information threats arising due to low–frequency acoustoelectric transformations." E3S Web of Conferences 224 (2020): 01042. http://dx.doi.org/10.1051/e3sconf/202022401042.
Повний текст джерелаNakamura, Ko, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone. "Information Leakage Threats for Cryptographic Devices Using IEMI and EM Emission." IEEE Transactions on Electromagnetic Compatibility 60, no. 5 (October 2018): 1340–47. http://dx.doi.org/10.1109/temc.2017.2766139.
Повний текст джерелаDu, Ruizhong, Yuqing Zhang, and Mingyue Li. "Database Padding for Dynamic Symmetric Searchable Encryption." Security and Communication Networks 2021 (December 31, 2021): 1–12. http://dx.doi.org/10.1155/2021/9703969.
Повний текст джерелаRogozin, E. A., D. G. Silka, and O. A. Gulyaev. "METHODOLOGY FOR ASSESSING THE SECURITY OF INFORMATION PASSED THROUGH THE TECHNICAL CHANNELS OF A SPECIAL-PURPOSE INFORMATISATION OBJECT." Herald of Dagestan State Technical University. Technical Sciences 46, no. 4 (January 2, 2020): 123–33. http://dx.doi.org/10.21822/2073-6185-2019-46-4-123-133.
Повний текст джерелаMiao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (July 2021): 1–36. http://dx.doi.org/10.1145/3465171.
Повний текст джерелаSekiguchi, Hidenori. "NOVEL INFORMATION LEAKAGE THREAT FOR INPUT OPERATIONS ON TOUCH SCREEN MONITORS CAUSED BY ELECTROMAGNETIC NOISE AND ITS COUNTERMEASURE METHOD." Progress In Electromagnetics Research B 36 (2012): 399–419. http://dx.doi.org/10.2528/pierb11101201.
Повний текст джерелаHamzah, Intan Suria. "Keselamatan Peribadi di Facebook: Ancaman dan Penyelesaian." Jurnal Komunikasi: Malaysian Journal of Communication 37, no. 1 (March 31, 2021): 379–95. http://dx.doi.org/10.17576/jkmjc-2021-3701-22.
Повний текст джерелаPrytys, V. I., L. А. Krymchak, and N. I. Havlovska. "Leakage of Information as a Key Problem of Information-Analytical Provision of Economic Security of Enterprise in the Context of Digitalization of the Economy." Business Inform 10, no. 513 (2020): 240–47. http://dx.doi.org/10.32983/2222-4459-2020-10-240-247.
Повний текст джерелаVassilakis, Costas. "Blockchain technologies for leveraging security and privacy." Homo Virtualis 2, no. 1 (March 27, 2019): 7. http://dx.doi.org/10.12681/homvir.20188.
Повний текст джерелаSkryl, S. V., M. P. Sychev, A. V. Mazin, T. V. Meshcheryakova, O. A. Gulyaev, and I. M. Tegentsev. "Directions for the development of the existing concept of assessing the relevance of information leakage through technical channels in the current trends of improving technical intelligence." Radio industry (Russia) 31, no. 1 (April 7, 2021): 74–83. http://dx.doi.org/10.21778/2413-9599-2021-31-1-74-83.
Повний текст джерелаFadaeinia, Bijan, Thorben Moos, and Amir Moradi. "Balancing the Leakage Currents in Nanometer CMOS Logic—A Challenging Goal." Applied Sciences 11, no. 15 (August 2, 2021): 7143. http://dx.doi.org/10.3390/app11157143.
Повний текст джерелаDzhulij, V. M., V. A. Boychuk, V. Y. Titova, O. V. Selyukov, and O. V. Miroshnichenko. "PROTECTION MODELS AND METHODS AGAINST THREATED PROGRAMS INFORMATION SYSTEMS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 67 (2020): 72–84. http://dx.doi.org/10.17721/2519-481x/2020/67-08.
Повний текст джерелаHu, Xiao-yang, Kai-yan Chen, Yang Zhang, Dong-xin Guo, and Yan-hai Wei. "Research on Electromagnetic Side-channel Signal Extraction for Mobile Device PCM-9589F Multi-COM." MATEC Web of Conferences 232 (2018): 04022. http://dx.doi.org/10.1051/matecconf/201823204022.
Повний текст джерелаGoli, Mehran, Muhammad Hassan, Daniel Große, and Rolf Drechsler. "Security validation of VP-based SoCs using dynamic information flow tracking." it - Information Technology 61, no. 1 (February 25, 2019): 45–58. http://dx.doi.org/10.1515/itit-2018-0027.
Повний текст джерелаBelokurov, S. V., Y. E. Lvovich, S. V. Ivanov, and A. N. Noev. "Mathematical modeling of mechanisms for detecting threats of information leakage through parametric channels." Journal of Physics: Conference Series 1202 (April 2019): 012012. http://dx.doi.org/10.1088/1742-6596/1202/1/012012.
Повний текст джерелаOnik, Md Mehedi Hassan, Chul-Soo Kim, Nam-Yong Lee, and Jinhong Yang. "Personal Information Classification on Aggregated Android Application’s Permissions." Applied Sciences 9, no. 19 (September 24, 2019): 3997. http://dx.doi.org/10.3390/app9193997.
Повний текст джерелаFabšič, Tomáš, Ondrej Gallo, and Viliam Hromada. "Simple Power Analysis Attack on the QC-LDPC McEliece Cryptosystem." Tatra Mountains Mathematical Publications 67, no. 1 (September 1, 2016): 85–92. http://dx.doi.org/10.1515/tmmp-2016-0032.
Повний текст джерелаChatel, Sylvain, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, and Jean-Pierre Hubaux. "SoK: Privacy-Preserving Collaborative Tree-based Model Learning." Proceedings on Privacy Enhancing Technologies 2021, no. 3 (April 27, 2021): 182–203. http://dx.doi.org/10.2478/popets-2021-0043.
Повний текст джерелаZhou, Yousheng, Xinyun Chen, and Meihuan Chen. "Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid." Security and Communication Networks 2020 (December 3, 2020): 1–14. http://dx.doi.org/10.1155/2020/8845959.
Повний текст джерелаSelifanov, Valentin, Oksana Ermak, Anna Yakunina, and Karina Yarkova. "ANALYSIS OF THE DEVELOPMENT OF MEANS OF INFORMATION PROTECTION." Interexpo GEO-Siberia 9 (2019): 25–29. http://dx.doi.org/10.33764/2618-981x-2019-9-25-29.
Повний текст джерелаKolomoets, E. "Ensuring information security in the field of remote work." Journal of Physics: Conference Series 2210, no. 1 (March 1, 2022): 012008. http://dx.doi.org/10.1088/1742-6596/2210/1/012008.
Повний текст джерелаTershukov, Dmitry. "Analysis of Modern Information Security Threats." NBI Technologies, no. 3 (January 2019): 6–12. http://dx.doi.org/10.15688/nbit.jvolsu.2018.3.1.
Повний текст джерелаGu, Jingjing, Ruicong Huang, Li Jiang, Gongzhe Qiao, Xiaojiang Du, and Mohsen Guizani. "A Fog Computing Solution for Context-Based Privacy Leakage Detection for Android Healthcare Devices." Sensors 19, no. 5 (March 8, 2019): 1184. http://dx.doi.org/10.3390/s19051184.
Повний текст джерелаBabenko, Aleksey, and Svetlana Kozunova. "The Model of Information Security Control in State Information Systems." NBI Technologies, no. 4 (February 2019): 16–22. http://dx.doi.org/10.15688/nbit.jvolsu.2018.4.3.
Повний текст джерелаAnjaria, Kushal, and Arun Mishra. "Thread scheduling using ant colony optimization: An intelligent scheduling approach towards minimal information leakage." Karbala International Journal of Modern Science 3, no. 4 (December 2017): 241–58. http://dx.doi.org/10.1016/j.kijoms.2017.08.003.
Повний текст джерела