Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/20.500.12258/12164Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Tebueva, F. B. | - |
| dc.contributor.author | Тебуева, Ф. Б. | - |
| dc.contributor.author | Rosenko, A. P. | - |
| dc.contributor.author | Росенко, А. П. | - |
| dc.contributor.author | Nechvoloda, V. E. | - |
| dc.contributor.author | Нечволода, В. Э. | - |
| dc.contributor.author | Smykova, V. N. | - |
| dc.contributor.author | Смыкова, В. Н. | - |
| dc.date.accessioned | 2020-06-30T14:11:33Z | - |
| dc.date.available | 2020-06-30T14:11:33Z | - |
| dc.date.issued | 2019 | - |
| dc.identifier.citation | Tebueva, F.B., Rosenko, A.P., Nechvoloda, V.E., Smykova, V.N. Development of methods and software modules security assessment information of limited distribution // CEUR Workshop Proceedings. - 2019. - Volume 2500 | ru |
| dc.identifier.uri | http://hdl.handle.net/20.500.12258/12164 | - |
| dc.description.abstract | This article leads a research on the development of a method and a program module evaluating the security of information of restricted access (IRA). The assessment of existing security technologies for information of limited access is given. Based on the general method of quantitative assessment of the safety of IRA a private method of quantitative assessment of the safety of IRA has been developed for a continuous flow of threats. The algorithm of the program for assessing the security of restricted access information for a continuous flow of threats has been developed and described | ru |
| dc.language.iso | en | ru |
| dc.publisher | CEUR-WS | ru |
| dc.relation.ispartofseries | CEUR Workshop Proceedings | - |
| dc.subject | Information is restricted | ru |
| dc.subject | Intensity of threat flow | ru |
| dc.subject | Mathematical modeling | ru |
| dc.subject | Parry intensity | ru |
| dc.subject | Probability of successful outcome | ru |
| dc.subject | Restricted access information | ru |
| dc.subject | Security assessment | ru |
| dc.subject | Security of data | ru |
| dc.title | Development of methods and software modules security assessment information of limited distribution | ru |
| dc.type | Статья | ru |
| vkr.inst | Институт информационных технологий и телекоммуникаций | ru |
| Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS | |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| scopusresults 1324 .pdf Restricted Access | 63.58 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.