Fuzzy assessment of information system security
Annotation
The article covers the assessment of information security efficiency in an automated system, based on a comparison of security indicators with using the engineering information security and without it in fuzzy perceptions of threat level.
Keywords
Постоянный URL
Articles in current issue
- II Всероссийский конгресс молодых ученых
- Взаимосвязь информации с энергией и массой
- Феномен информации. С позиции религии и науки раскрывается сущность информации и ее роль в мироздании
- The combined method of control of mutual maneuver the spacecraft
- SXF format map conversion technology for storing in ArcGIS spatial databases
- Application of digital Image processing for determination of Ike aircraft spatial position
- Theoretical aid methodical bases of formation of an object-oriented Information model if the navigation database
- Methods of developing a plan for the establishment of open digital navigation maps and plans of cities on the territory of the Russian Federation
- ArcGIS object -oriented database multiscale spatial data storage technology
- Program complex of similar territorial zones simulation modeling
- Formalized statement of the problem of synthesis of the structure of the system of clock network synchronization for the telecommunication system
- Method of calculation of the function of reliability and connectivity for directions of alerts in emergency situations
- The general formulation of the problem of system design of fiber-optical layer of the transport network of the telecommunications system of Russian Federation
- The problems of creating of the zonal Integrated system of argent alert of tee population on the example of tea Rostov region and lie proposals on their solution
- A Platform for construction of multi-service subscriber access mode in the creation of an integrated system of emergency informing and alerting to the populating
- Control of nonsingularity in nonlinear ptoblems
- Перспективы развития ФАР
- Features of DSRC technology in the framework of the Intelligent Transport Systems
- Protected Biometrical Identification in Accept Control System I. Mathematical models and algorithms
- Аn assessment of information system security based on a model of a complex of protection mechanisms