Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information security system synthesis
biblio
The Information Security System Synthesis Using the Graphs Theory
Submitted by grigby1 on Wed, 11/14/2018 - 12:21pm
Russian Federation leISSlation
information security threats
optimal enterprise information protection system
optimality problem solution
optimality problem solution on the graph theory basis
protection vector isolation
pubcrawl
ranked descending graph construction
resilience
Resiliency
information security system synthesis based on graph theory
Scalability
security
security of data
Software
software complex basis
software information security
software restriction
tools
graph critical path
access subjects authentication
access subjects identification
computer storage media protection
enterprise information security
enterprise information security system
expert systems
FSTEC order No31
graph calculation
access delineation
graphs theory
graph theory
Hardware
hardware complex basis
hardware information security
Human behavior
information security
information security system synthesis