Basis for the formation of a simulation stand for modeling of violator’s actions in the protected information and telecommunication infrastructure
Published: 18.11.2013
Authors: Gerasimov A.A., Mozgovoy A.V., Pugachev K.A., Kuznetsov V.A.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-1018
Category: Information technology | Chapter: Information Security