Found: 32
Select item for more details and to access through your institution.
AN APPROACH FOR OPTIMIZED ARCHITECTURAL DESIGN OF VIRTUAL LOCAL AREA NETWORK.
- Published in:
- Communication & Cognition, 2022, v. 55, n. 3/4, p. 119, doi. 10.57028/c55-119-z1025
- By:
- Publication type:
- Article
Technological aspects of e-governance.
- Published in:
- Electrotechnica & Electronica (E+E), 2022, v. 57, n. 1/2, p. 1
- By:
- Publication type:
- Article
Mathematical Model Investigation of a Technological Structure for Personal Data Protection.
- Published in:
- Axioms (2075-1680), 2023, v. 12, n. 2, p. 102, doi. 10.3390/axioms12020102
- By:
- Publication type:
- Article
Stochastic Approach to Investigate Protected Access to Information Resources in Combined E-Learning Environment.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 16, p. 2909, doi. 10.3390/math10162909
- By:
- Publication type:
- Article
Mathematical Modelling and Study of Stochastic Parameters of Computer Data Processing.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 18, p. 2240, doi. 10.3390/math9182240
- By:
- Publication type:
- Article
Secure HIGHT Implementation on ARM Processors.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 9, p. 1044, doi. 10.3390/math9091044
- By:
- Publication type:
- Article
Regression Methods Based on Nearest Neighbors with Adaptive Distance Metrics Applied to a Polymerization Process.
- Published in:
- Mathematics (2227-7390), 2021, v. 9, n. 5, p. 547, doi. 10.3390/math9050547
- By:
- Publication type:
- Article
An Approach for Mathematical Modeling and Investigation of Computer Processes at a Macro Level.
- Published in:
- Mathematics (2227-7390), 2020, v. 8, n. 10, p. 1838, doi. 10.3390/math8101838
- By:
- Publication type:
- Article
Business virtual system in the context of e‐governance: Investigation of secure access to information resources.
- Published in:
- Journal of Public Affairs (14723891), 2020, v. 20, n. 3, p. 1, doi. 10.1002/pa.2072
- By:
- Publication type:
- Article
PRELIMINARY ORGANIZATION OF VIRTUAL NETWORK BASED ON PROGRAM MONITORING.
- Published in:
- International Journal on Information Technologies & Security, 2024, v. 16, n. 3, p. 111
- By:
- Publication type:
- Article
FEATURES OF E-BUSINESS AND E-COMMERCE WITH A REFLECTION ON PRIVACY IN THE DIGITAL AGE.
- Published in:
- International Journal on Information Technologies & Security, 2023, v. 15, n. 3, p. 115, doi. 10.59035/voty8866
- By:
- Publication type:
- Article
INVESTIGATION OF COMMUNICATION PARAMETERS BASED ON MONITORING AND STATISCAL MODELLING.
- Published in:
- International Journal on Information Technologies & Security, 2023, v. 15, n. 2, p. 47, doi. 10.59035/kqeh1710
- By:
- Publication type:
- Article
EMPIRICAL EVALUATION OF THE TRANSFER OF INFORMATION RESOURCES IN ACTIVE LEARNING.
- Published in:
- International Journal on Information Technologies & Security, 2023, v. 15, n. 1, p. 39, doi. 10.59035/wzfu1905
- By:
- Publication type:
- Article
AN APPROACH FOR PROGRAM INVESTIGATION OF COMPUTER PROCESSES PRESENTED BY MARKOV MODELS.
- Published in:
- International Journal on Information Technologies & Security, 2022, v. 14, n. 4, p. 45
- By:
- Publication type:
- Article
DIGITAL AGE AND PERSONAL DATA PROTECTION.
- Published in:
- International Journal on Information Technologies & Security, 2022, v. 14, n. 3, p. 89
- By:
- Publication type:
- Article
STATISTICAL ANALYSIS OF EMPIRICAL NETWORK TRAFFIC DATA FROM PROGRAM MONITORING.
- Published in:
- International Journal on Information Technologies & Security, 2022, v. 14, n. 3, p. 15
- By:
- Publication type:
- Article
EVALUATION OF EXPERIMENTAL DATA FROM MONITORING AND SIMULATION OF NETWORK COMMUNICATION PARAMETERS.
- Published in:
- International Journal on Information Technologies & Security, 2022, v. 14, n. 2, p. 75
- By:
- Publication type:
- Article
ORGANIZATION OF TECHNOLOGICAL STRUCTURES FOR PERSONAL DATA PROTECTION.
- Published in:
- International Journal on Information Technologies & Security, 2022, v. 14, n. 1, p. 97
- By:
- Publication type:
- Article
PRIVACY AND DATA PROTECTION IN THE CONTEMPORARY DIGITAL AGE.
- Published in:
- International Journal on Information Technologies & Security, 2021, v. 13, n. 4, p. 99
- By:
- Publication type:
- Article
PROGRAM ENVIRONMENT FOR INVESTIGATION OF MICRO-LEVEL COMPUTER PROCESSING.
- Published in:
- International Journal on Information Technologies & Security, 2021, v. 13, n. 1, p. 67
- By:
- Publication type:
- Article
TECHNOLOGICAL ORGANIZATION OF THE ACCESS MANAGEMENT TO INFORMATION RESOURCES IN A COMBINED E-LEARNING ENVIRONMENT.
- Published in:
- International Journal on Information Technologies & Security, 2019, v. 11, n. 4, p. 51
- By:
- Publication type:
- Article
A SURVEY OF INFORMATIZATION AND PRIVACY IN THE DIGITAL AGE AND BASIC PRINCIPLES OF THE NEW REGULATION.
- Published in:
- International Journal on Information Technologies & Security, 2019, v. 11, n. 1, p. 95
- By:
- Publication type:
- Article
A SURVEY ON DIGITAL WORLD OPPORTUNITIES AND CHALLENGES FOR USER'S PRIVACY.
- Published in:
- International Journal on Information Technologies & Security, 2017, v. 9, n. 4, p. 97
- By:
- Publication type:
- Article
INTERNATIONAL PROJECT FETCH: FINAL MEETING AND E-LEARNING CONFERENCE.
- Published in:
- 2016
- By:
- Publication type:
- Proceeding
THIRD MEETING OF THE INTERNATIONAL PROJECT FETCH.
- Published in:
- 2015
- By:
- Publication type:
- Proceeding
SOCIAL MEDIA AND PERSONAL DATA PROTECTION.
- Published in:
- International Journal on Information Technologies & Security, 2014, v. 6, n. 4, p. 65
- By:
- Publication type:
- Article
TECHNOLOGICAL ASPECTS OF MOBILE PAYMENTS ORGANIZATION.
- Published in:
- International Journal on Information Technologies & Security, 2014, v. 6, n. 3, p. 55
- By:
- Publication type:
- Article
New European Thematic Network "Future Education and Training in Computing: How to support learning at anytime anywhere" (FETCH).
- Published in:
- International Journal on Information Technologies & Security, 2013, v. 5, n. 4, p. 47
- By:
- Publication type:
- Article
INTERNATIONAL BUSINESS SCHOOL IS A PARTNER IN EUROPEAN PROJECT FETCH.
- Published in:
- International Journal on Information Technologies & Security, 2014, v. 6, n. 1, p. 53
- By:
- Publication type:
- Article
AN APPLICATION OF PROCEDURE FOR ANALYTICAL EVALUATION OF COMPUTER STRUCTURES.
- Published in:
- International Journal on Information Technologies & Security, 2013, v. 5, n. 2, p. 55
- By:
- Publication type:
- Article
CLOUD SERVICES: CHALLENGES FOR PERSONAL DATA PROTECTION.
- Published in:
- International Journal on Information Technologies & Security, 2012, v. 4, n. 3, p. 67
- By:
- Publication type:
- Article
Challenges of the digital age for privacy and personal data protection.
- Published in:
- Mathematical Biosciences & Engineering, 2020, v. 17, n. 5, p. 5288, doi. 10.3934/mbe.2020286
- By:
- Publication type:
- Article