PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM

Objectives. Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the following: despite the fact that the considered method...

Full description

Saved in:
Bibliographic Details
Main Authors: I. G. Drovnikova, A. A. Zmeev, E. A. Rogozin
Format: Article
Language:Russian
Published: Dagestan State Technical University 2019-05-01
Series:Вестник Дагестанского государственного технического университета: Технические науки
Subjects:
Online Access:https://vestnik.dgtu.ru/jour/article/view/596
Tags: Add Tag
No Tags, Be the first to tag this record!