|
advertisement |
|
|
|
|
|
|
Instruments and Systems: Monitoring, Control, and Diagnostics Annotation << Back
Private methods of formation of requirements to systems of protection of information from unauthorized access in automated systems based on the use of the methods of evolutionary modeling |
A.A. ZMEEV
Based on the analysis of disadvantages of the existing methods of forming requirements to the information protection systems (IPS)
from unauthorized access (UA) to automated systems (AS) using the methods of evolutionary modeling is proposed free from identified
deficiencies private methods with practical value and allows you to shape the quantitative requirements to a wide class certified on a
particular class of security as in accordance with the requirements of the current normative documentation.
Keywords: automated system, information protection system, unauthorized access, genetic algorithm, evaluation network (E-network),
Markov model.
Contacts: E-mail: tzmeev@yandex.ru
Pp. 08-13. |
|
|
|
Last news:
Выставки по автоматизации и электронике «ПТА-Урал 2018» и «Электроника-Урал 2018» состоятся в Екатеринбурге Открыта электронная регистрация на выставку Дефектоскопия / NDT St. Petersburg Открыта регистрация на 9-ю Международную научно-практическую конференцию «Строительство и ремонт скважин — 2018» ExpoElectronica и ElectronTechExpo 2018: рост площади экспозиции на 19% и новые формы контент-программы Тематика и состав экспозиции РЭП на выставке "ChipEXPO - 2018" |