The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an approach to simplifying security in large organizations, ensuring that the work of ordinary employees is more accessible without negatively impacting the organization's security. Access to the Internet is becoming increasingly important in various aspects of human life, including interpersonal communication, professional work, and business operations. Enterprises have digitized...
Data files, photos, and videos on the internet are vast sources of information about the person who posted them. These files contain content about appearance, behaviour, views, and material status. Analyzing these files helps verify the accuracy of the content and helps verify the creation method. Social media platforms like Facebook, Twitter, and Instagram often post this information. Public databases...
Artificial Intelligence (AI) methods are widely used in our lives (phones, social media, self-driving cars, and e-commerce). In AI methods, we can find convolutional neural networks (CNN). First of all, we can use these networks to analyze images. This paper presents a method for classifying items into particular categories on an auction site. The technique prompts the seller to which category assign...
One of the main problems of the digital world is information security. Every second, peopleprocess millions of pieces of information that must be protected from unauthorized access. Cryptographic protocols that define the communication plan and the cryptographictechniques used to secure the messages come to the rescue. These protocols should alsobe regularly verified regarding their ability to protect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.