LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Publisher: National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"
Journal: Electronics and Communications
Languages: Russian
Types: Article
Subjects: theory of sensitivity information and telecommunication systems; information security, теория чувствительности; информационно-телекоммуникационные системы; информационная безопасность, теорія чутливості; інформаційно-телекомунікаційні системи; інформаційна безпека
Offered approach to the design protected informatively - telecommunication system on the basis of theory of sensitiveness. The research of the existing approaches to the mathematical modeling of complex technical systems. Which showed some of their disadvantages associated with limitations and assumptions are not compatible with the real process of their functioning. A mathematical model is improved by protected informatively - telecommunication system, different from known the account of existent features of ill-intentioned external influences and corresponding changes of internal descriptions of the system. Equalizations and functions of sensitiveness, allowing to take into account possible changes protected informatively, are specified - telecommunication system in the conditions of affecting her ill-intentioned attacks. Developed higher-order sensitivity equation that can improve the accuracy of the description of the change process parameters secure information technology system under the conditions of independent malicious actions. Bibl. 11
  • No references.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article