Перегляд за автором "Saburova, S."
Зараз показано 1 - 3 з 3
Результатів на сторінку
Варіанти сортування
Публікація Out-of-band radiation in information processing equipment measurement of communication systems(ХНУРЕ, 2023) Kadatskaja, О.; Yerrafiq Muad,; Martynchuk, A.; Saburova, S.In work investigating methods for detecting and analyzing OBR, using statistical method for evaluating the quality indicators of developed OBR mitigation methods based on mathematical modeling. Is propose methods of using SDR receivers to detect and analyze electromagnetic emissions and reducing OBR to improve the security of electronic devices can be applied in the field of measurement and in organizing the protection of information systems.Публікація Out-of-band radiation in information processing equipment measurement using software tools(ХНУРЕ, 2023) Kadatskaja, О.; Yerrafiq Muad; Martynchuk, A.; Saburova, S.In work investigating methods for detecting and analyzing OBR, using statistical method for evaluating the quality indicators of developed OBR mitigation methods based on mathematical modeling. Is propose methods of using SDR receivers to detect and analyze electromagnetic emissions and reducing OBR to improve the security of electronic devices can be applied in the field of measurement and in organizing the protection of information systems.Публікація Out-of-band radiation in information processing equipment measurement using software tools.(ХНУРЕ, 2023) Kadatskaja, О.; Yerrafiq, Muad; Martynchuk, A.; Saburova, S.The purpose of work is which includes addressing the concern of OBR as a potential cyber-attack vector, exploring the potential of software-defined radio (SDR) receivers, evaluating the effectiveness of SDR-based solutions, identifying vulnerabilities in information processing equipment, and contributing to the existing knowledge on OBR and its impact on cybersecurity. The suggested approach revolves around leveraging SDR receivers to detect and analyze OBR signals, developing new security mechanisms, conducting experiments and simulations to evaluate effectiveness, identifying vulnerabilities, and proposing robust security measures.