2019 3rd International Conference on Advanced Information and Communications Technologies (AICT) 2019
DOI: 10.1109/aiact.2019.8847853
|View full text |Cite
|
Sign up to set email alerts
|

Method of Increasing the Identification Friend or Foe Systems Information Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 10 publications
0
2
0
1
Order By: Relevance
“…Accordingly, the presence of such resources in any firm could earn the organization an advantage over its competing organization and also attain an upgrade in general firm operations. Earlier studies have looked at IT threats (Safa et al , 2018; McDermott et al , 2019; Siddiqui et al , 2020), Information Systems (IS) development policies (Hina and Dominic, 2017, 2018; Temel and Karimov, 2019) and IS security (Niemimaa and Niemimaa, 2017; Boiko and Shendryk, 2017; Siponen and Baskerville, 2018; Merhi and Ahluwalia, 2019; Svyd et al , 2019; Berdik et al , 2021) and IT security culture (Mahfuth et al , 2017; Nævestad et al , 2018; Nasir et al , 2019; Asamoah et al , 2021). These studies seldom explored the moderated-mediated role of OC and IT strategy on the relationship between ERM and IT security especially within the financial sector in emerging economies where cyberattacks keeps increasing.…”
Section: Literat Ure Reviewmentioning
confidence: 99%
“…Accordingly, the presence of such resources in any firm could earn the organization an advantage over its competing organization and also attain an upgrade in general firm operations. Earlier studies have looked at IT threats (Safa et al , 2018; McDermott et al , 2019; Siddiqui et al , 2020), Information Systems (IS) development policies (Hina and Dominic, 2017, 2018; Temel and Karimov, 2019) and IS security (Niemimaa and Niemimaa, 2017; Boiko and Shendryk, 2017; Siponen and Baskerville, 2018; Merhi and Ahluwalia, 2019; Svyd et al , 2019; Berdik et al , 2021) and IT security culture (Mahfuth et al , 2017; Nævestad et al , 2018; Nasir et al , 2019; Asamoah et al , 2021). These studies seldom explored the moderated-mediated role of OC and IT strategy on the relationship between ERM and IT security especially within the financial sector in emerging economies where cyberattacks keeps increasing.…”
Section: Literat Ure Reviewmentioning
confidence: 99%
“…However, in most real-world classification problems, the data distribution is skewed, i.e., some classes have more samples than others. For example, in the IFF (Identification Friend or Foe) problem [2], the number of friend targets (majority classes) is more than that of enemy targets (minority classes). There are more legitimate credit card users than fraudulent credit card users in the case of credit card fraud detection [3].…”
Section: Introductionmentioning
confidence: 99%
“…Це обумовлено тим, що вторинні радіолокаційні системи [4,5] забезпечують як радіолокаційне спостереження за повітряними об'єктами, обладнаними літаковими літакового відповідачами [6], так і забезпечують двосторонню передачу інформації за каналами запиту та відповіді [7,8], тобто передачу інформації між повітряними об'єктами та наземними вторинними радіолокаційними станціями. До вторинних радіолокаційних систем відносяться вторинні оглядові радіолокатори [9][10][11][12] та системи ідентифікації за ознакою «свій-чужий» [13][14][15][16][17][18]. При цьому слід зазначити, що у теперішній час існують два принципу побудови зазначених інформаційних систем [19].…”
unclassified