Autors: Romansky, R. P., Noninska, I. S.
Title: Architecture of Combined e-Learning Environment and Investigation of Secure Access and Privacy Protection
Keywords: combined e-learning, secure access, privacy

References

  1. Romansky, R., Noninska, I., 2016, Architecture of Combined e-Learning Environment and Investigation of Secure Access and Privacy Protection, International Journal of Human Capital and Information Technology Professionals (IJHCITP), ISSN: 1947-3478, Volume 7 (3), pp. 89-106

Issue

International Journal of Human Capital and Information Technology Professionals (IJHCITP), vol. 7, issue 3, pp. 89-106, 2016, United States, IGI Global Publ., DOI: 10.4018/IJHCITP.2016070107

Цитирания (Citation/s):
1. S. A. Tkalich, V. I. Burkovsky, O. Ja. Kravets. Comparison of the neural net training algorithms for the emergencies forecasting of technological processes. IOP Conference Series: Materials Science and Engineering, Volume 537, 2019 (International Workshop "Advanced Technologies in Material Science, Mechanical and Automation Engineering – MIP: Engineering – 2019"), Online ISSN: 1757-899X; Print ISSN: 1757-8981; 4–6 April 2019, Krasnoyarsk, Russian Federation; https://iopscience.iop.org/article/10.1088/1757-899X/537/3/032040 - 2019 - в издания, индексирани в Scopus или Web of Science
2. O Ja Kravets, A V Burkovsky and O G Yaskevich. Approach to mathematical simulation of data networking with packet routing. Journal of Physics: Conference Series (APITECH-2019), 1399: 033082; doi: 10.1088/1742-6596/1399/3/033082 - 2019 - в издания, индексирани в Scopus или Web of Science
3. A V Zimin, I V Burkova, O Ja Kravets, V V Zimin. The mechanism for the generalized dual problem of network programming solving. Journal of Physics: Conference Series (APITECH-2019), 1399: 033031; doi: 10.1088/1742-6596/1399/3/033031 - 2019 - в издания, индексирани в Scopus или Web of Science
4. Shafagat Mahmudova. Exploring Personal Data Protection Methods with Program Tools, V Republican Conference “Actual multidisciplinary scientific-practical problems of information security”, 29 Nov 2019, pp.70-73; DOI: 10.2545/NCInfoSec.2019.16 - 2019 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
5. Shafagat Jabrayil Mahmudova. Exploring the Personal Data Protection Methods through Programs. Transactions on Networks and Communications, ISSN: 2054-7420, vol. 8, No. 1, Feb 2020, pp. 1-7; DOI: https://doi.org/10.14738/tnc.81.7682 - 2020 - от чужди автори в чужди издания, неиндексирани в Scopus или Web of Science
6. O Ja Kravets, S V Shaytura, A M Minitaeva, I V Atlasov. Analysis of routing processes in telecommunication networks with unsteady flows using Markov processes, May 2020 IOP Conference Series Materials Science and Engineering 862:052005; DOI: 10.1088/1757-899X/862/5/052005 - 2020 - в издания, индексирани в Scopus или Web of Science
7. Zhu Gao. The Practical Dilemma and Method of Personal Protection in the Era of Big Data, Journal of Physics Conference Series 1574:012107, June 2020; DOI: 10.1088/1742-6596/1574/1/012107 - 2020 - в издания, индексирани в Scopus или Web of Science

Вид: статия в списание, публикация в издание с импакт фактор, публикация в реферирано издание, индексирана в Scopus