Steganographic methods of information protection in telecommunication systems special purpose
dc.contributor.author | IbrŠ°himov, B. G. | |
dc.contributor.author | Tahirova, K. M. | |
dc.date.accessioned | 2024-05-27T11:01:48Z | |
dc.date.available | 2024-05-27T11:01:48Z | |
dc.date.issued | 2024 | |
dc.identifier.citation | IbrŠ°himov B. G. Steganographic methods of information protection in telecommunication systems special purpose / B. G. IbrŠ°himov, K. M. Tahirova // Š”ŃŃŠ°ŃŠ½Ń Š½Š°ŠæŃŃŠ¼Šø ŃŠ¾Š·Š²ŠøŃŠŗŃ ŃŠ½ŃŠ¾ŃŠ¼Š°ŃŃŠ¹Š½Š¾-ŠŗŠ¾Š¼ŃŠ½ŃŠŗŠ°ŃŃŠ¹Š½ŠøŃ ŃŠµŃ Š½Š¾Š»Š¾Š³ŃŠ¹ ŃŠ° Š·Š°ŃŠ¾Š±ŃŠ² ŃŠæŃŠ°Š²Š»ŃŠ½Š½Ń : ŃŠµŠ·Šø Š“Š¾Šæ. 14-Ń Š¼ŃŠ¶Š½Š°Ń. Š½Š°ŃŠŗ.-ŃŠµŃ Š½. ŠŗŠ¾Š½Ń., 25-26 ŠŗŠ²ŃŃŠ½Ń 2024 Ń., ŠŠ°ŠŗŃāŠ„Š°ŃŠŗŃŠ²āŠŠøŠ»ŃŠ½Š° : [Ń 2 Ń.]. Š¢. 2 : ŃŠµŠŗŃŃŃ 3-6 / ŠŠ°Ń. ŃŠ½-Ń Š¾Š±Š¾ŃŠ¾Š½Šø ŠŠ·ŠµŃŠ±Š°Š¹Š“Š¶Š°Š½ŃŃŠŗŠ¾Ń Š ŠµŃŠæŃŠ±Š»ŃŠŗŠø [ŃŠ° ŃŠ½.]. ā Š„Š°ŃŠŗŃŠ² : Impress., 2024. ā Š”. 10-11. | |
dc.identifier.uri | https://repository.kpi.kharkov.ua/handle/KhPI-Press/77735 | |
dc.language.iso | en | |
dc.publisher | Impress | |
dc.subject | steganography | |
dc.subject | information confidentiality | |
dc.subject | information protection | |
dc.title | Steganographic methods of information protection in telecommunication systems special purpose | |
dc.type | Article |
Š¤Š°Š¹Š»Šø
ŠŠ¾Š½ŃŠµŠ¹Š½ŠµŃ ŃŠ°Š¹Š»ŃŠ²
1 - 1 Š· 1
ŠŠ°Š½ŃŠ°Š¶ŠøŃŃŃŃ...
- ŠŠ°Š·Š²Š°:
- Ibrahimov_Steganographic_2024.pdf
- Š Š¾Š·Š¼ŃŃ:
- 219.32 KB
- Š¤Š¾ŃŠ¼Š°Ń:
- Adobe Portable Document Format
ŠŃŃŠµŠ½Š·ŃŠ¹Š½Š° ŃŠ³Š¾Š“Š°
1 - 1 Š· 1
ŠŃŠŗŃŠ· Š½ŠµŠ“Š¾ŃŃŃŠæŠ½ŠøŠ¹
- ŠŠ°Š·Š²Š°:
- license.txt
- Š Š¾Š·Š¼ŃŃ:
- 1.71 KB
- Š¤Š¾ŃŠ¼Š°Ń:
- Item-specific license agreed upon to submission
- ŠŠæŠøŃ: