Mechanisms of cybersecurity: the problem of conceptualization

Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.

Подобные документы

  • The problem of parametric identification of mathematical models of reservoir systems for the porosity and permeability functions of ground rock. A solve the problem based on the gradient projection method with minimization of a squared quality criterion.

    статья, добавлен 28.08.2016

  • The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.

    статья, добавлен 01.11.2021

  • Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.

    книга, добавлен 08.03.2014

  • Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.

    статья, добавлен 01.02.2024

  • Investigation of a person's ability to work with information. Study of the neural executive mechanisms of the brain. Creation of a multicomponent model of short-term memory of Russian students, the development of their creative and intellectual abilities.

    статья, добавлен 07.04.2021

  • A Trojan as a hidden threat, much like the famed Trojan horse left by Odysseus on the shores of Troy. Targeting, distribution and activation mechanisms of the worms. Drive-by-Downloads, email, network intrusion, social engineering, business models.

    лекция, добавлен 23.05.2016

  • Revolutionary changes in the intellectual development of mankind. The emergence of a second human signaling system, awareness of the nature of the formation of cognitive abilities of the human brain and the formation of highly intelligent neural networks.

    статья, добавлен 15.04.2024

  • FSMs are widely used in various application domains such as telecommunication systems, communication protocols and other systems. Existence of a separating sequence of two FSMs depends on the number of nondeterministic transitions in these FSMs.

    реферат, добавлен 20.08.2010

  • A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.

    статья, добавлен 15.09.2012

  • Characteristics of the model research cyber-physical systems in industrial production. Description of the hardware installation process and software environment. Consideration of modern approaches to modeling distributed software and semantic data.

    статья, добавлен 23.02.2016

  • The issue of necessity of monitoring circumstance of software systems implemented through service-based principle in conditions of continuous development and enhancement. Pattern and antipattern detection. Metric calculation algorithms. Response time.

    дипломная работа, добавлен 31.10.2016

  • Improvement of devices containing electronic elements. Application of mechatronic systems in the automotive industry. Using Solidworks software for the design of mobile robot on four or more wheeled chassis. Calculation of stresses of structural parts.

    статья, добавлен 13.10.2020

  • A test-bed for research cyber-physical production systems and the hardware setup and the software environment. A new approach for distributed software and semantic data modelling is introduced. System SEPIA - а semantic cyber-physical system approach.

    статья, добавлен 23.02.2016

  • Description of technology of off-wire computer networks with the productivity 100 Mb/s in the point of output and maintenance of information. Description of parameters of middle access and determination of multiple entrance. Physical layer, radio, WLAN.

    методичка, добавлен 10.08.2011

  • Фреймворк как язык для описания, понимания и управления рисками информационной безопасности, как внешними, так и внутренними. Части фреймворка: ядро, профили, уровни реализации. Процесс управления рисками. Сравнение профилей и выявление недостатков.

    статья, добавлен 05.05.2019

  • Methods for regulating traffic and handling user reputation in the context of BitTorrent networks. An overview of various methods for calculating user reputation in networks and methods for differentiating the quality of service based on them.

    статья, добавлен 03.12.2020

  • Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.

    статья, добавлен 14.01.2017

  • The technical aspects of building a solution to our problem of predicting advertisement banner efficiency. Rectified Linear Units activation function. A simple neural network architecture, trustworthy model. Visualizing convolutional neural networks.

    дипломная работа, добавлен 13.07.2020

  • Обзор протокола Multi-Touch технологий передачи данных. Анализ и сравнение версий протокола Multi-Touch технологий передачи данных. Требования к разрабатываемой системе. Методы разработки программного комплекса. Программное обеспечение для Multi-Touch.

    курсовая работа, добавлен 01.10.2016

  • Feature models for the study of cyber-physical systems in the field of industrial production. Description of the installation of equipment and software environment. Analysis of the current approach for modeling of distributed software and semantic data.

    статья, добавлен 23.02.2016

  • Organizational problems that affect the decision. Socio-technical model and methodology of soft systems. Training users find information. The impact of structure in work. Free search system problems computer. Electronic communication as a critical mass.

    лекция, добавлен 28.12.2013

  • Levels of programming support tools. Elements of windowing systems. Possible software architectures. Using toolkits for objects interaction. Paradigms for programming interfaces in applications. Implementation of user interface management systems (UIMS).

    презентация, добавлен 28.12.2013

  • The use firewalls to create a demilitarized zone to protect the servers from unauthorized access. The versions of creation of virtual private networks that can combine some geographically distant networks in one network using global information space.

    статья, добавлен 27.07.2016

  • Criteria for desirable cryptographic systems and protocols. Security properties for authenticated key establishment. Standard notation of mathematical foundations. Classical ciphers: usefulness and security. The optimal asymmetric encryption padding.

    книга, добавлен 13.03.2014

  • Иерархия классов Microsoft Foundation Classes, функции, файлы, каркас программы. Обработка сообщений. Ресурсы и акселераторы. Диалоги и знакомство с элементами управления. Вывод текста и шрифты. Графические функции, организация вывода в виртуальное окно.

    учебное пособие, добавлен 07.02.2011

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.