Fast Two-Factor Authentication Method in Systems With a Centralized User's Database
work proposes a two-factor authentication method by integrating the second factor into the
authentication service in system with a centralized user's database. This approach made it …
authentication service in system with a centralized user's database. This approach made it …
Methodology for determining the rational number of UAVs taking into account their reliability in emergency situations
I Ruban, V Lebediev - 2022 IEEE 3rd KhPI Week on Advanced …, 2022 - ieeexplore.ieee.org
Creating a system of control and analysis of emergency situations is an important task for
most countries of the world. Currently, projects have been initiated to analyze, assess the …
most countries of the world. Currently, projects have been initiated to analyze, assess the …
[PDF][PDF] МЕТОД ПІДТРИМКИ ПРИЙНЯТИХ РІШЕНЬ ЩОДО БЕЗПЕКИ ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ
ОП Черних - repository.kpi.kharkov.ua
Наукова новизна отриманих результатів обумовлена теоретичним узагальненням і
новим вирішенням важливої науково-технічної проблеми, яка полягає в розробці …
новим вирішенням важливої науково-технічної проблеми, яка полягає в розробці …
Resource distribution method in computer systems on integrated software platforms
НГ Кучук, ГМ Зубрицький… - Системи обробки …, 2022 - journal-hnups.com.ua
Computer Systems on Integrated Software Platforms are gaining popularity among users.
They have a number of advantages over other platforms. In particular, this is a reduction in …
They have a number of advantages over other platforms. In particular, this is a reduction in …