SIMULATION OF PERIPHERAL DEVICE SECURITY: IMPLEMENTATION AND PRACTICAL EVLUATION OF ADDRESS SPACES PROTECTION IN A TRUSTED MICROPROCESSOR EMULATOR
Managing information security in automated control systems in conditions the growing number of cyber threats requires the development of specialized architecturally resilient solutions. Necessary security can be achieved through the use of trusted microprocessors and systems based on them. During th...
Saved in:
| Main Authors: | Mikael A. Kondakhchan, Nikita A. Grevtsev, Peter A. Chibisov |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2025-07-01
|
| Series: | Безопасность информационных технологий |
| Subjects: | |
| Online Access: | https://bit.spels.ru/index.php/bit/article/view/1819 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
The Influence of South Africa’s Democratic Principles on its Cybersecurity Framework and Cyber Threat Response
by: Venencia Paidamoyo Nyambuya, et al.
Published: (2025-04-01) -
СУЧАСНА ПОЛІТИКА БЕЗПЕКИ КІБЕРПРОСТОРУ В УМОВАХ ЙОГО МІЛІТАРИЗАЦІЇ
by: Oleksandr M. Kosohov, et al.
Published: (2015-12-01) -
Reasons for the increase in cyber attacks: analysis of technical and non-technical factors
by: A. V. Vasilyev
Published: (2023-11-01) -
VIRTUAL REALITY: U.S. INFORMATION SECURITY THREATS CONCEPT AND ITS INTERNATIONAL DIMENSION
by: E. V. Batueva
Published: (2014-06-01) -
ТЕНДЕНЦІЇ РОЗВИТКУ КІБЕРЗАГРОЗ У СВІТОВОМУ ІНФОРМАЦІЙНОМУ ПРОСТОРІ
by: Oleg R. Cherniak, et al.
Published: (2015-01-01)