To obtain access to full text of journal and articles you must register!
- Article name
- The basic modeling technology procedures to protect information from unauthorized access
- Authors
- Kulikov G. V., , , JSC "NPO RusBITeh", Moscow, Russia
Nepomnyashchikh A. V., , planetnaya3@gmail.com, JSC "NPO RusBITeh", Moscow, Russia
Sosnin Yu. V., , , JSC "NPO RusBITeh", Moscow, Russia
Nashchekin P. A., , , JSC "Concern" Systemprom", Moscow, Russia
- Keywords
- protection of information from unauthorized access / game theory / information security / the automated systems
- Year
- 2014 Issue 1 Pages 23 - 28
- Code EDN
- Code DOI
- Abstract
- Describes the basic model of the process of information security in the implementation of unauthorized access to it, including the modeling of unauthorized access to stored, processed and transmitted, simulation, information security and information security processes in terms of the unauthorized access. The advantages of the software system security evaluation facilities of automated systems that implements the developed models.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy