A description of architecture and approaches to the implementation of a protection system of metadatabased adaptable information systems is suggested. Various protection means are examined. The system described is a multilevel complex based on a multiagent system combining IDS functional abilities with structure and logics protection means
Today the most vital asset of any enterprise is its data and to maintain its security. In order to m...
New technologies provide much more progressive ways of working with information. Access to info...
This paper deals with problems of the development and security of distributed information systems. I...
The disadvantages and advantages of the risk measurement methods used in the integrated protection s...
A crisis resulting from disruptive events that threaten to harm the organization or its stakeholders...
Information and communication technology (ICT) has made remarkable impact on the society, especially...
The information and communication technologies advances made available enormous and vast amounts of ...
Quality security of sensitive data and key assets becomes now a question of absolute necessity for a...
Data has become the most important asset for the companies, and data protection against loss is fund...
Recently, cybersecurity threat management policy is important to be integrated in the management of ...
This paper presents the concept of distributed IT application in the context of knowledge society. S...
Information security is tasked with protecting the confidentiality, integrity, and availability of a...
The fast development of computer technology and electronic networks has contributed to the introduct...
Intelligent data-centric critical systems play a key role into several fundamental human activities....
The problems of the new industry 4.0 automation paradigm are considered and the latest technologies ...
Today the most vital asset of any enterprise is its data and to maintain its security. In order to m...
New technologies provide much more progressive ways of working with information. Access to info...
This paper deals with problems of the development and security of distributed information systems. I...
The disadvantages and advantages of the risk measurement methods used in the integrated protection s...
A crisis resulting from disruptive events that threaten to harm the organization or its stakeholders...
Information and communication technology (ICT) has made remarkable impact on the society, especially...
The information and communication technologies advances made available enormous and vast amounts of ...
Quality security of sensitive data and key assets becomes now a question of absolute necessity for a...
Data has become the most important asset for the companies, and data protection against loss is fund...
Recently, cybersecurity threat management policy is important to be integrated in the management of ...
This paper presents the concept of distributed IT application in the context of knowledge society. S...
Information security is tasked with protecting the confidentiality, integrity, and availability of a...
The fast development of computer technology and electronic networks has contributed to the introduct...
Intelligent data-centric critical systems play a key role into several fundamental human activities....
The problems of the new industry 4.0 automation paradigm are considered and the latest technologies ...
Today the most vital asset of any enterprise is its data and to maintain its security. In order to m...
New technologies provide much more progressive ways of working with information. Access to info...
This paper deals with problems of the development and security of distributed information systems. I...