Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

access subjects authentication

biblio

Visible to the public The Information Security System Synthesis Using the Graphs Theory

Submitted by grigby1 on Wed, 11/14/2018 - 1:21pm
  • Russian Federation leISSlation
  • information security threats
  • optimal enterprise information protection system
  • optimality problem solution
  • optimality problem solution on the graph theory basis
  • protection vector isolation
  • pubcrawl
  • ranked descending graph construction
  • resilience
  • Resiliency
  • information security system synthesis based on graph theory
  • Scalability
  • security
  • security of data
  • Software
  • software complex basis
  • software information security
  • software restriction
  • tools
  • graph critical path
  • access subjects authentication
  • access subjects identification
  • computer storage media protection
  • enterprise information security
  • enterprise information security system
  • expert systems
  • FSTEC order No31
  • graph calculation
  • access delineation
  • graphs theory
  • graph theory
  • Hardware
  • hardware complex basis
  • hardware information security
  • Human behavior
  • information security
  • information security system synthesis

Terms of Use  |  ©2023. CPS-VO