62 research outputs found

    Short-range order and electronic properties of epitaxial graphene

    Get PDF
    One of the most rapidly developing areas of modern materials science is the study of graphene and materials on its basis. The experimental investigations have revealed different types of defects on the surface of graphene that form the ordered structures of atomic configurations. In the present work, the value of short-range order parameter for different configurations of foreign atoms in a graphene layer was calculated. The effect of various factors on the density of electronic states and electrical resistance in graphene was also investigated. The type of the ordering of foreign atoms in graphene rather than the concentration of impurities, was shown to be responsible for the change in the conductivity of graphene

    PECULIARITIES OF INFORMATION SECURITY IN MOBILE DEVICES RUNNING THE ANDROID OPERATING SYSTEM

    Get PDF
    Objectives The article presents a formal model of information security in mobile devices running the Android operating system, an example of detection and investigation of malicious software, as well as static and dynamic analysis of malicious software.Method To protect sensitive information on mobile devices, you can use software and organizational measures at the same time.Result The proposed formal model of information security and analysis of suspected malicious software will ensure the security of information in mobile devices, as well as reduce the risk of threats to an acceptable level at a minimum cost of the protection system. The presented algorithm of the application designed for illegal transfer of funds, as well as an example of the analysis of this application will allow the specialist to improve the quality of their professional tasks in the analysis of incidents in the field of information security.Conclusion Due to the fact that today there is no scientifically based method of detection and analysis of malicious software in the memory of mobile devices, the information provided in this article will help to improve the efficiency of information protection in mobile devices running the Android operating system
    corecore