The bias of the initial information flows intensities estimates of the global cyber-physical network
Estimation of input flow intensities measured by the number of devices connected to the CPS (accumulated, living things plus unliving things) as a function of accumulated product flows. Statistics on the number of non-living devices connected to the CPS.
Подобные документы
The first public key system - Diffie-Hellman key agreement. Solving discrete logarithm problem. Mutual identification with key establishment. Unicity distance for secret key cipher. Statistical tests for random and pseudo-random number generators.
книга, добавлен 08.03.2014Характеристика протоколу контролю передачі даних (TCP). Ієрархія протоколів, маршрутизація TCP/ІP, ІP адресація й імена об'єктів у мережі Іnternet. Реалізація TCP/ІP для Wіndows, атаки на мережі і захист від них. Пророкування TCP sequence number.
курсовая работа, добавлен 01.03.2011Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.
статья, добавлен 09.09.2021Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.
книга, добавлен 08.03.2014Reveal and compare modern methods of information search in digital environment. Characterization of the features of the rapid development of information technologies, which shapes spheres of human life, as well as the process of information provision.
статья, добавлен 22.03.2023Arithmetic and number theory in C and C++. The fundamental operations in programs. Modular arithmetic: calculating with residue classes. Addition chains and windows. Cryptographic application of exponentiation. A modern the data encryption standard.
книга, добавлен 08.03.2014Peculiarities of hackers and hacktivists' participation in modern hybrid conflicts. Analysis of "localization" of hactivist activity on the example of the Belarusian group "Cyber Partisans". Significance of partisan themes for modern Belarusian identity.
статья, добавлен 24.02.2024A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.
книга, добавлен 08.03.2014Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
статья, добавлен 29.01.2016FSMs are widely used in various application domains such as telecommunication systems, communication protocols and other systems. Existence of a separating sequence of two FSMs depends on the number of nondeterministic transitions in these FSMs.
реферат, добавлен 20.08.2010The complex of program models of technical system of ecological monitoring, its structure and components. Models based on the results of the studied biophysical effects of the influence of certain technical pollutants on the cells of living organisms.
статья, добавлен 22.12.2016Различные типы Network Address Translation, которые могут использоваться при передаче потоковых данных. Сложность обеспечения передачи потоковых данных через преобразование сетевых адресов. Применение стандартизованных технологий в сокращенном варианте.
статья, добавлен 29.04.2017Definition of information security. Methods and means of information protection. Access Control - information protection regulation of the use of all resources of IP and IT. Protection of data and programs from unauthorized access, copying, modification.
реферат, добавлен 04.04.2016Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, Oрnet, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.
статья, добавлен 25.12.2016Mathematical methods for finding object boundaries and measuring the size, color, speed of bubbles in the flotation foam. The possibility of the search for this signature by measuring the deviations of the center of mass of a number of sequential images.
статья, добавлен 14.01.2017- 116. Quantum information
Quantum coherence and information processing. Expectation values and the von Neumann projection. Quantum relative and conditional entropies. Information and the foundations of physics. Application quantum coding, error detection, and correction.
книга, добавлен 08.03.2014 The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.
статья, добавлен 28.09.2016The main features of non-traditional social engineering. Characteristics of the main non-traditional design, which involves the formation of a number of new types of activities (involvement of users in design, complex management and project expertise).
статья, добавлен 26.04.2023Information technology - a broad class of disciplines and areas of activity related to technology creation, preservation, management and processing of data, including the use of computer technology. The information technology industry. Search engine.
презентация, добавлен 16.02.2015Обзор некоторых новых процедур обработки данных, включенных в последние годы в статистическую систему IBM SPSS Statistics, которые могут быть полезны психологам в исследованиях. Характеристика нового многоуровневого типа статистического анализа данных.
статья, добавлен 19.12.2020- 121. National cyber security system of Ukraine: perspectives of policy development and capacity building
The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.
статья, добавлен 03.12.2020 - 122. Boolean retrieval
Information Retrieval as finding material of an unstructured nature that satisfies an information need from within large collections. Unstructured (text) and structured (database) data in 1996 and 2006. Basic assumptions of Information Retrieval.
презентация, добавлен 19.02.2014 The principle of quantum cryptography. Quantum no-cloning theorem. State detection and random number generator. Verify assumptions used in a security proof. Quantum hacking and countermeasures from this. Introduction of cryptography for engineers.
книга, добавлен 08.03.2014Classical and quantum physics and information theory. Von Neumann entropy and relevant measures. Accessible classical and quantum information. Data processing. Real-life applications of information theory. A commercial quantum cryptographic device.
книга, добавлен 15.09.2012The process of helicopter pilots training by simulator. Analyzed the aviation accidents due to human factor. The way of estimation of pilots training by simulators. The formalization of the educational process with the control of training information.
статья, добавлен 26.06.2016