This article describes a solution for the protection of the temporary lifting of control over the target machine, while using information leakage detection and prevention systems. It is proposed to use a specially designed channel for alert’s signals through the computer’s power supply
The transition to the use of a radio channel for the transfer of critical information in automatic l...
The purpose of the article was to analyze technique to prevent information leakage using covert chan...
Systems and methods of providing opportunistic security for physical communication channels are disc...
This article discusses a new way of developing a special channel for the alarms, through computer’s ...
The existing methods of information protection from leakage by high-frequency imposition channels ar...
The rapid development and constant growth of the use of computer equipment, wireless radio access sy...
The problem of information leakage through electromagnetic waves for various devices has been extens...
Problem statement. The investigation the currently used methods for determining the sources of infor...
This paper discusses active methods and means of protecting information from leaks through the chann...
The purpose of this work is to design a covert agent structure that can create a non-zero frequency ...
The use of noise generators for the protection and information leakage channels stray electromagneti...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
The task we consider is counteraction to the information security incidents. The special feature of ...
In this paper, the design and the development of a remote system for continuous monitoring of leakag...
This paper discusses the interference phenomenon of computer cables loaded with a sequence of low en...
The transition to the use of a radio channel for the transfer of critical information in automatic l...
The purpose of the article was to analyze technique to prevent information leakage using covert chan...
Systems and methods of providing opportunistic security for physical communication channels are disc...
This article discusses a new way of developing a special channel for the alarms, through computer’s ...
The existing methods of information protection from leakage by high-frequency imposition channels ar...
The rapid development and constant growth of the use of computer equipment, wireless radio access sy...
The problem of information leakage through electromagnetic waves for various devices has been extens...
Problem statement. The investigation the currently used methods for determining the sources of infor...
This paper discusses active methods and means of protecting information from leaks through the chann...
The purpose of this work is to design a covert agent structure that can create a non-zero frequency ...
The use of noise generators for the protection and information leakage channels stray electromagneti...
We present a new class of covert channels which can be created by utilizing common hardware but tha...
The task we consider is counteraction to the information security incidents. The special feature of ...
In this paper, the design and the development of a remote system for continuous monitoring of leakag...
This paper discusses the interference phenomenon of computer cables loaded with a sequence of low en...
The transition to the use of a radio channel for the transfer of critical information in automatic l...
The purpose of the article was to analyze technique to prevent information leakage using covert chan...
Systems and methods of providing opportunistic security for physical communication channels are disc...