I. E. Gorbachev

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Sorry, we do not have enough data to show an influence graph for this author.
Learn More
This paper presents an approach for the information security analysis of automated systems. The random behavior of new vulnerabilities that occur in the automated system in the process of operation is investigated. The formalization required to evaluate information security, which is based on the methods of the stochastic indication theory, is presented.
  • 1