STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS
Journal Title: Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska - Year 2018, Vol 8, Issue 4
Abstract
An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented.<br/><br/>
Authors and Affiliations
Anna Romanova, Sergiy Toliupa
DIGITAL TECHNOLOGIES FOR SUPPORTING THE MANAGEMENT PROCESSES OF TEACHER PROFESSIONAL GROWTH WITHIN THE DEPARTMENTS OF MANAGEMENT IN THE UNIVERSITIES OF THE REPUBLIC OF POLAND
The article examines the possible forms of self-management of the teacher professional growth of the management departments in the universities of the Republic of Poland. The following forms of enhancement of the teacher...
Ekspertyza Komitetu Elektrotechniki PAN: Mapa rozwoju dyscypliny Elektrotechnika
BUILDING OPTIMAL BOUNDARY CONTROL BY THE SUCCESSIVE APPROXIMATIONS METHOD
The article suggests a method for calculating the boundary control in the tape bearings optimal program using the method of successive approximations.
ANALIZA ZMIAN CHORÓB SKÓRNYCH PRZY POMOCY ODWZOROWAŃ PRZESTRZENI BARW
Głównym celem artykułu jest analiza zmian dermatologicznych skóry w oparciu o analizę modelu przestrzeni barw, z których autorzy są w stanie wydobyć informacje przydatne dla systemu ekspertowego. W artykule autorzy badaj...
CREATING ALGORITHM FOR SIMULATION OF FORMING FLAT WORKPIECES
Problems of creating of the algorithm and software for the simulation of some metal forming processes are considered. The results obtained in the simulation of the flow pattern of metal for processes of forging and stamp...