Search Results - "Revyakina Elena"
-
1
Development of a secure video chat based on the WebRTC standard for video conferencing
Published in E3S web of conferences (01-01-2023)“…The article describes the process of developing a secure video chat based on the WebRTC standard for establishing a connection and exchanging information…”
Get full text
Journal Article -
2
Creation of an encryption algorithm resistant to attacks through side channels of leakage
Published in E3S web of conferences (2024)“…The paper is devoted to.the development of an encryption algorithm resistant to leakage through side channels The objectives of the work were the development…”
Get full text
Journal Article -
3
Using machine learning to forecast hard drive failures
Published in E3S web of conferences (2024)“…The aim of this research is to develop an effective tool for assessing the condition of computer hardware based on an intelligent method. The outcome of this…”
Get full text
Journal Article -
4
Circuit engineering solutions for high - temperature analog microcircuits in extreme environmental conditions
Published in E3S web of conferences (01-01-2023)“…The current geopolitical situation and import–substitution challenges facing the domestic electronics industry require the creation of devices capable of…”
Get full text
Journal Article -
5
Implementation of steganographic software for hiding information in mpeg video files
Published in E3S web of conferences (01-01-2023)“…This article is devoted to the implementation of a steganographic software tool for hiding infor-mation in MPEG video files. The method of least significant…”
Get full text
Journal Article -
6
Development of modification of the post-quantum public-key cryptosystem NTRUENCRYPT
Published in E3S web of conferences (01-01-2023)“…This work is devoted to the development of a modification of the post-quantum public-key cryptosystem NTRUEncrypt. Given that two main requirements for modern…”
Get full text
Journal Article -
7
Searching for and blocking destructive content in images
Published in E3S Web of Conferences (01-01-2023)“…Children and underage teenagers use the Internet not only for communication. So, for 2020, children aged five to seven years in half of cases use the network…”
Get full text
Journal Article Conference Proceeding -
8
Internet platform for analyzing computer memory of Windows operating systems for conducting information security investigations
Published in E3S web of conferences (01-01-2023)“…Within the framework of this article, an analysis of the dynamics of the growth of information security incidents identified in companies by specialists of the…”
Get full text
Journal Article -
9
System for detecting of potentially dangerous communications of network users
Published in E3S Web of Conferences (01-01-2023)“…This work is devoted to the processes of organizing internal information security at the enterprise. The scheme of a software tool for monitoring employee…”
Get full text
Journal Article Conference Proceeding -
10
Increase in the efficiency of water transport of bulk mineral cargo by the segregation of feedstock at the initial technological stage
Published in E3S web of conferences (01-01-2021)“…The paper gives the analysis of the volume of transportation of bulk mineral cargoes by water transport. It is established that the problem of the use of…”
Get full text
Journal Article Conference Proceeding -
11
Development of a system for protecting against DDoS attacks at the L7 level of the OSI model - HTTP Flood
Published in E3S web of conferences (01-01-2023)“…In today’s world of globalization and the development of information technology, it is not possible to build a business and production without using the latest…”
Get full text
Journal Article -
12
Ensuring the security of web applications operating on the basis of the SSL/TLS protocol
Published in E3S web of conferences (01-01-2023)“…SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as…”
Get full text
Journal Article -
13
Development of safety monitor from destructive influences of web–sites and social networks of internet
Published in E3S web of conferences (2021)“…This article discusses the main age-related features of the Internet use by adolescents and children. Today more and more computers are connected to the…”
Get full text
Journal Article Conference Proceeding -
14
Development of a real-time document approval system
Published in E3S Web of Conferences (2021)“…The article describes the preparation of the document approval system before the start of development, the project architecture, and testing. The work…”
Get full text
Journal Article Conference Proceeding -
15
Digitalization of the agro-industrial complex: analysis of existing vulnerabilities in quantum cryptography systems
Published in E3S Web of Conferences (01-01-2020)“…This article deals with vulnerabilities of quantum cryptography systems and quantum key distribution. Solutions that exclude the possibility of quantum attacks…”
Get full text
Journal Article Conference Proceeding -
16
The complexity of student-led research: from terminology to practice in a case study of three countries
Published in Oxford review of education (02-01-2024)“…Preparing young people to meet emerging contemporary challenges has become a global imperative. Over two decades, there has been a call for students' active…”
Get full text
Journal Article -
17
The development of countermeasures against session hijacking
Published in E3S web of conferences (01-01-2024)“…This article provides information about Session Hijacking and discusses countermeasures to prevent Session Hijacking attacks. In modern web applications and…”
Get full text
Journal Article