
The analysis of methods of determination of functional types of security of the information-telecommunication system from an unauthorized access
Author(s) -
С. С. Бучик,
О. К. Юдін,
Р. В. Нетребко
Publication year - 2016
Publication title -
problemi ìnformatizacìï ta upravlìnnâ
Language(s) - English
Resource type - Journals
ISSN - 2073-4751
DOI - 10.18372/2073-4751.4.13135
Subject(s) - computer science , completeness (order theory) , computer security , identifier , relation (database) , functional requirement , information security , security analysis , telecommunications , data mining , computer network , mathematics , software engineering , mathematical analysis