Hieroglyphic sign weakening mechanisms
This article is the study of the Chinese characters through the semiotic weakening law. The hieroglyphic sign shapes the Chinese linguistic and cultural domain following the unique algorithm to code information. However, the linear principle of the Indo-European semiotics can hardly be applied ...
Forensic characteristics of creation, use and distribution of malicious computer programs
Malicious software and viral phishing attacks have remained for several consecutive years among the most effective tools for infiltrating information infrastructure. In the vast majority of cases, the exploitation of malicious software is associated with gaining access to systems containing confidential information and its theft, which constitutes the least costly method for delivering and executing malicious code on a recipient’s device. Given that the increase in unlawful acts related to the creation...