2019
DOI: 10.3390/sym11020150
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Methods—Modern Research Directions

Abstract: In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the development of a comprehensive approach to assessing the security of the information systems. This direction includes the construction of an information security threats model and a protection system model, which allow to compile a complete list of threats and methods … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 110 publications
0
12
0
Order By: Relevance
“…They proposed utilizing a prediction technique and judgment process to efficiently choose the embeddable blocks in data hiding, extraction, and recovery stages. At the end of image compression, the processed image was used for watermarking and steganography [11,12].…”
Section: Related Workmentioning
confidence: 99%
“…They proposed utilizing a prediction technique and judgment process to efficiently choose the embeddable blocks in data hiding, extraction, and recovery stages. At the end of image compression, the processed image was used for watermarking and steganography [11,12].…”
Section: Related Workmentioning
confidence: 99%
“…The communication frame consists of the DCT watermarked mimicked signal. 3 The frequency spectrum of a real humpback whale song is shown in Figure 2. The song has a wide range of frequencies; however, the main energy lies in the low frequency region around 150 Hz.…”
Section: Frame Structurementioning
confidence: 99%
“…The communication frame consists of the DCT watermarked mimicked signal. 3 The synchronization header consists of a humpback whale song segment with a checksum of bits. We added a checksum as it will verify the mimicked signal for the receiver.…”
Section: Frame Structurementioning
confidence: 99%
See 1 more Smart Citation
“…An urgent task is to develop an effective methodology for compiling a list of threats to information security, the use of which will minimize the impact of the professional level and subjective opinion of an expert. This study is part of the development of a comprehensive approach to assessing the security of the information systems conducted in Tomsk University of Control Systems and Radioelectronics [9]. This paper addresses the issue of identifying security threats to computer network software.…”
Section: Introductionmentioning
confidence: 99%