Analysis of Cyber Security Threats of the Printing Enterprise
Abstract: The topic of scientific works on the implementation of modern technologies and systems of automated management of the enterprise,
Read MoreAbstract: The topic of scientific works on the implementation of modern technologies and systems of automated management of the enterprise,
Read MoreAbstract: The topic of scientific works on the implementation of modern technologies and systems of automated management of the enterprise,
Read MoreThe UK government has launched new, stricter cyber security measures designed inresponse to the growth of ransomware attacks. These measures have been
Read MoreAbstract: The complication of technological processes due to the modernization of complex technological processes aggregates with a distributed spatial infrastructure
Read MoreAbstract: Today, there are many methods for detecting blocks with repetitions and redundancy in the program code. But mostly they
Read MoreAbstract: When creating signature-based cybersecurity systems for network intrusion detection (NIDS), spam filtering, protection against viruses, worms, etc., developers have
Read MoreAbstract: This paper is devoted to the investigation of the applicability of the Kolmogorov–Wiener filter to the prediction of heavy-tail
Read MoreOverview Unlike 4G, 5G goes beyond purely voice and faster data speed for consumer. Instead, 5G is also a major
Read MoreAbstract: Currently, the urgent task is developing the methods and tools for increasing Smart Parking software system security. The purpose
Read MoreAbstract: Wireless Sensor Network (WSN) is a group of small, intelligent sensors with limited resources. WSN has limited energy restrictions,
Read More