Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification

Objective. The objective of the study is software analysis of hashing, compression and recovery methods and development of a software module on this basis.Method. Hashing algorithms were used in the study.Result. The possible functionality of the software tool and organized integrity checking mechan...

Full description

Saved in:
Bibliographic Details
Main Authors: L. V. Cherkesova, V. A. Savelyev, E. A. Revyakina, A. R. Polulyakh, M. A. Sementsov
Format: Article
Language:Russian
Published: Dagestan State Technical University 2025-04-01
Series:Вестник Дагестанского государственного технического университета: Технические науки
Subjects:
Online Access:https://vestnik.dgtu.ru/jour/article/view/1708
Tags: Add Tag
No Tags, Be the first to tag this record!