Національний юридичний університет імені Ярослава Мудрого ⚖ Головна ⓘ Довiдка
Авторизацiя
Прiзвище (укр.)
N Читацького квитка
 

Бази даних


Е-картотека "Публікації вчених НЮУ ім. Ярослава Мудрого в Scopus" - результати пошуку

Вид пошуку

  • Власна база даних
  • Більше 728 000 документів: книги, статті, збірники наукових праць, рідкісні видання, дисертації, автореферати
  • Створюється з 1999 року
  • Легкий, зручний, багатоаспектний інформаційний пошук
  • Можливість цілодобово працювати з інформаційним контентом
  • Електронне замовлення книг дистанційно
Область поиска
 Найдено в других БД:Eлектронний каталог (12)Зведений електронний каталог «Правова освіта. Правова культура» (1)
Формат представлення знайдених документів :
полныйинформационныйкраткий
Отсортировать найденные документы по:
авторузаглавиюгоду изданиятипу документа
Пошуковий запит: 

(<.>U=004.056<.>)

Загальна кількість знайденихдокументів : 2
Показані документи с 1 по 2
1.

S98

    Synergy of building cybersecurity systems [Електронний ресурс] : monograph / S. Yevseiev, V. Ponomarenko, O. Laptiev, O. Milova, O. Korol, Y. Melenti and others. - Kharkiv : PC TECHNOLOGY CENTER, 2021. - 175 p.
Перевод заглавия: Синергія побудови систем кібербезпеки
   Перевод заглавия: Синергія побудови систем кібербезпеки
УДК
РУБ DOI: 10.15587/978-617-7319-31-2

Аннотация: The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed.

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Свободных экз. нет

Найти похожие

2.

M78

    Modeling of security systems for critical infrastructure facilities [Електронний ресурс] : monograph / S. Yevseiev, R. Hryshchuk, K. Molodetska, M. Nazarkevych, Y. Melenti and others. - Kharkiv : PC TECHNOLOGY CENTER, 2022. - 181 p.
Перевод заглавия: Моделювання систем безпеки об’єктів критичної інфраструктури
   Перевод заглавия: Моделювання систем безпеки об’єктів критичної інфраструктури
УДК
РУБ DOI: 10.15587/978-617-7319-57-2

Аннотация: The development of Industry 4.0 technologies is based on the rapid growth of the computing capabilities of mobile wireless technologies, which has made it possible to significantly expand the range of digital services and form a conglomeration of socio-cyber-physical systems and smart technologies. The First Section discusses the issues of building security systems based on the proposed Concept of multi-contour security systems, taking into account the hybridity and synergy of modern targeted cyber-attacks, their integration with social engineering methods. This approach not only increases the level of security, but also forms an objective approach to the use of post-quantum security mechanisms based on the proposed Lotka-Volterra models. The Second Section analyzes the features of the functioning of social Internet services and establishes their role in ensuring the information security of the state. An approach is proposed to identify signs of threats in the text content of social Internet services, which will allow to quickly respond to changing situations and effectively counteract such threats. A classifier of information security profiles of users of social Internet services has been developed to assess the level of their danger as potential participants in disinformation campaigns. A method for identifying and evaluating the information and psychological impact on user communities in services is proposed. Models of conflict interaction of user groups in social Internet services are considered on the example of civil movements. To effectively counter threats to information security of the state, it is proposed to use the concept of synergistic user interaction and self-organization processes in a virtual community. Particular attention is paid to countering the manipulation of public opinion in the decision-making process by users of social Internet services. The Third Section proposes a biometric security system that works to authenticate users based on a comparison of their fingerprints and certain templates stored in a biometric database. A method for determining the contour based on the passage of a curve and the filtering function of contour lines has been developed. The stage of skeletal identification is analyzed in detail. The Ateb-Gabor method with wave thinning has been developed. The performance of skeletal algorithms such as the Zhang-Suen thinning algorithm, the Hilditch algorithm, and the Ateb-Gabor method with wave decimation is analyzed. The presented results of experiments with biometric fingerprints based on the NIST Special Database 302 database showed the effectiveness of the proposed method. The software and firmware were developed using the Arduino Nano.

Анотація - 0 байт
Анотація,
Текст - 0 байт
Текст,
Scopus - 0 байт
Scopus
Свободных экз. нет

Найти похожие

 

Умовні позначення місця знаходження

3_пов.(ЗПІ) – зала правової інформації, НБК

4_пов.(НАб) – абонемент наукової літератури, НБК

4_пов.(ДБФ) – довідково-бібліографічний фонд, НБК

5_пов.(З/П) – зала періодичних видань, НБК

6_пов.(АХЛ) – абонемент художньої літератури, НБК

6_пов.(ЗІЛ) – зала літератури іноземними мовами, НБК

7_пов.(Хр) – книгосховище, НБК

8_пов.(РК) – книгосховище рідкісних видань та дисертацій, НБК

НБВ – інформаційно-бібліографічний відділ, НБК, 7 поверх

Ст.Аб. – студентський абонемент, НБК, 5 поверх

Філ №1 – філія № 1 (вул. Динамівська, 4)

Філ №2 – філія № 2 (вул. Григорія Сковороди, 106)

Полт. фак. – Полтавський юридичний інститут, м. Полтава