Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

Detection Hardware Virtual Machine Based Rootkits

Subjects: Rootkits; virtualization technology; detection malware

  • Source: Безопасность информационных технологий, Vol 17, Iss 1, Pp 80-82 (2010)

تفاصيل العنوان

×
Academic Journal

Closed Classes of Boolean Functions Problems Solving

Subjects: Boolean functions; closed classes; typical tasks

  • Source: Безопасность информационных технологий, Vol 18, Iss 4, Pp 46-49 (2011)

تفاصيل العنوان

×
Academic Journal

The Message Authentication Code Based on Universal Hashing

Subjects: message authentication code; universal hashing; authenticity

  • Source: Безопасность информационных технологий, Vol 19, Iss 2, Pp 38-42 (2012)

تفاصيل العنوان

×
Academic Journal

Software for security event management: Development and utilization

Subjects: security event; security event management; SIEM

  • Source: Безопасность информационных технологий, Vol 24, Iss 4, Pp 52-59 (2017)

تفاصيل العنوان

×
Academic Journal

Technique of experimental evaluation of cloud environment attacks detection accuracy

Subjects: efficiency evaluation; efficiency scores; IDS

  • Source: Безопасность информационных технологий, Vol 25, Iss 2, Pp 54-62 (2018)

تفاصيل العنوان

×
Academic Journal

Distributed ledger as a tool to ensure trust among business process participants

Subjects: Information technology; T58.5-58.64; Information theory

  • Source: Безопасность информационных технологий, Vol 26, Iss 4, Pp 37-53 (2019)

تفاصيل العنوان

×
  • 1-10 ل  16 نتائج ل ""Universal""