Information protection and cybersecurity
Information protection and cybersecurity
|
Issue number: |
View the article: |
Authors: |
|
Vol. 9 № 2 2026 200–207 |
A method for operative sharing confidential images among a group of trusted users |
|
|
Vol. 9 № 1 2026 62–75 |
An empirical evaluation of reasoning models for classifying information manipulation techniques |
|
|
Vol. 7 № 2 2024 162–174 |
The improvement of web-application SDL process to prevent Insecure Design vulnerabilities |
|
|
Vol. 6 № 1 2023 84–99 |
Investigation of reconfigurable hardware platforms for 5G protocol stack functions acceleration |
|
|
Vol. 6 № 1 2023 74–83 |
|
|
|
Vol. 5 № 4 2022 371–386 |
|
|
|
Vol. 5 № 1 2022 64–75 |
Effectiveness of stego images pre-processing with spectral analysis methods |
|

