Problem statement. The investigation the currently used methods for determining the sources of information leakage threats from the basic hardware and systems (BHaS) through the spurious electromagnetic radiation and interference (SERaB) channels on the object of informatization (OoI), gives grounds to assert that they have a number of disadvantages. The lack of а formal interpretation for process dynamics of the SERaB information collecting and implementing measures to prevent information leakage requires development of a systematic approach to improving the ways and means of protecting confidential information from leakage through SERaB channels.The purpose. Development of mathematical models and a systematic approach to improving methods...
Objectives. In order to determine the security of a special-purpose informatisation object, it is ne...
The problem of information leakage through electromagnetic waves for various devices has been extens...
International audienceWhile operating, information processing devices or communication systems may e...
The rapid development and constant growth of the use of computer equipment, wireless radio access sy...
This paper discusses active methods and means of protecting information from leaks through the chann...
Electromagnetic information leak as a potential data security risk is more and more serious. Discuss...
Formulation of the problem. The completeness of the characteristics of one of the most serious threa...
The existing methods of information protection from leakage by high-frequency imposition channels ar...
Electromagnetic leakage will happen in working information equipments; it could lead to information ...
While working with the information and communication technology we are being exposed to a number of ...
The use of noise generators for the protection and information leakage channels stray electromagneti...
Electromagnetic leakage will happen in working information equipments; it could lead to information ...
The paper deals with the problem of estimating the information security of data exchange through the...
The significant increase in requirements for distributed control objects’ functioning can’t be reali...
The article deals with an approach to determining the state of information security based on the ana...
Objectives. In order to determine the security of a special-purpose informatisation object, it is ne...
The problem of information leakage through electromagnetic waves for various devices has been extens...
International audienceWhile operating, information processing devices or communication systems may e...
The rapid development and constant growth of the use of computer equipment, wireless radio access sy...
This paper discusses active methods and means of protecting information from leaks through the chann...
Electromagnetic information leak as a potential data security risk is more and more serious. Discuss...
Formulation of the problem. The completeness of the characteristics of one of the most serious threa...
The existing methods of information protection from leakage by high-frequency imposition channels ar...
Electromagnetic leakage will happen in working information equipments; it could lead to information ...
While working with the information and communication technology we are being exposed to a number of ...
The use of noise generators for the protection and information leakage channels stray electromagneti...
Electromagnetic leakage will happen in working information equipments; it could lead to information ...
The paper deals with the problem of estimating the information security of data exchange through the...
The significant increase in requirements for distributed control objects’ functioning can’t be reali...
The article deals with an approach to determining the state of information security based on the ana...
Objectives. In order to determine the security of a special-purpose informatisation object, it is ne...
The problem of information leakage through electromagnetic waves for various devices has been extens...
International audienceWhile operating, information processing devices or communication systems may e...