Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 16, Issue 12024
Publisher:
  • Inderscience Publishers
  • World Trade Center Bldg, 29, route de Pre-Bois, Case Postale 896
  • Geneva 15
  • Switzerland
ISSN:1751-911X
EISSN:1751-9128
Reflects downloads up to 03 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
Essence, concept, and types of national legislation in the field of information technology

The relevance of scientific work is due to the high level of development of innovative technologies in the world community, which contributes to the development of new approaches to ensuring the interests of citizens, including in the information ...

research-article
Legal mechanism for regulating responsibilities in the information sphere

The relevance is conditioned upon the fact that the information sphere affects the components of the security of the Republic of Kazakhstan, such as political, economic, social, and others. The purpose of the research is to identify all the ...

research-article
Security of internet of things based on cryptographic algorithm

The desire for automated and connected gadgets has managed to become more significant as the globe continues to advance. The internet of things (IoT), a brand-new idea that focuses around the idea of smart gadgets, has been launched in order to address ...

research-article
Internet of things-based virtual private social networks on a text messaging strategy on mobile platforms

A virtual private social network (VPSN) allows a device to communicate securely with a network via the internet. Confidential data may be sent more securely thanks to the encrypted connection; it allows the user to operate remotely and prevents ...

research-article
Formulation of a two-level electronic security and protection system for malls

Electronics are everywhere around us these days, and many of them help us maintain security in different locations. However, there are still numerous security issues that banks, residences, and other establishments must deal with. The real-time ...

research-article
An original data encryption technique for communication networks

A novel secure distribution technique of network communication data is developed based on data encryption algorithm to address the issues of poor transfer effectiveness and high transmission bit error rate in previous transmission methods. In order to ...

research-article
Analysis of smart grid-based intrusion detection system through machine learning methods

This article aims to maximise network strong security and its enhancement by presenting different preventative strategies since intrusion detection is essential to computer network security challenges. In this study, intrusion detection is addressed as a ...

research-article
Image encryption based on 3D Arnold and elementary cellular automata method

The traditional image encryption methods have some problems, such as poor security and inefficient encryption. This paper proposes a new image encryption method based on 3D Arnold-oriented elementary cellular automata. The new image encryption method ...

research-article
Data hiding using video steganography

Video steganography aims to hide the presence of a communication from a hostile third party. One of the techniques recommended in this study is the hash-based least significant bit method for video steganography. The study conducts an in-depth analysis ...

research-article
Security in database management system using machine learning

The term 'database security' refers to the collection of rules, tools, and processes that have been developed to maintain and protect the databases' confidentiality, integrity, and accessibility. The use of machine learning to improve database management ...

Comments