COMPUTER TARGET AND STRATEGY FORMATION OF THE INFORMATION SYSTEM SAFETY VIOLATOR
The article deals with communication of strategic, tactical targets and the strategy realized by the violator of safety of information system. Semantic models and algorithms are developed for a conclusion of the purposes and strategies; criteria and tasks for strategies assessment, based on represen...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Plekhanov Russian University of Economics
2016-05-01
|
| Series: | Открытое образование (Москва) |
| Subjects: | |
| Online Access: | https://openedu.rea.ru/jour/article/view/209 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!