Tag: information and communication technologies

System of evolutionary forecasting of synergistic effect of mergers and acquisitions of enterprises

Purpose. This model, by introducing arithmetic blocks for calculating the numerical values ​​of the income dynamics of populations in the…

Applied system for assessing information security risks

Purpose. An applied information security risk assessment system using CVSS values ​​(versions 2.0 and 3.0) of indicators presented in the…

Applied Anomaly Detection System

Purpose. An applied anomaly detection system that, due to cyber-attack databases, rules and standards, allows to expand the functionality of…

Damage assessment system in case of leakage of state secrets

Purpose. The “System for Analysis and Assessment of the Amount of Potential Damage to National Security of the State in…

Cryptographic module for the formation and verification of an electronic digital signature with recovery based on the use of elliptic curves

Purpose. This software module can be further integrated into websites, mobile and software applications, as well as into information and…

Cryptographic module for the formation and verification of electronic digital signatures using additional cryptographic algorithms

Purpose. The cryptographic protection module can be used to ensure the integrity and confidentiality of information. Scope. The cryptographic protection…

Cryptographic module of homomorphic procedure of encryption and decryption of information based on the use of additional parameters

Purpose. The software module can be further integrated into websites, mobile and software applications, as well as into information and…

Information technology for controlling the movement of UAVs in a city under the guidance of ground situation centers

Purpose. For: 1. Improving the coordination of the work of state life support systems of cities and private services is…

Technology for constructing a secure information exchange system based on non-divided factorial coding

Purpose. To ensure secure information exchange, including in extreme (crisis) situations, based on the methodology of integrated information protection through…

Intelligent technology for computer understanding of natural texts

Purpose. To implement applied and technological tasks of computer linguistics: intellectual analysis of natural language texts, identification of semantic-syntactic relations…