Search by keyword: "unauthorized access"
Life Cycle Models for Data System of Onboard Device with Counteraction to Unauthorized Access
Authors: Generalov D.N., Shlegel, Pyrkin N.N. | Published: 03.11.2013 |
Published in issue: #4(81)/2010 | |
DOI: | |
Category: Informatics & Computing Technology | |
Keywords: data system, life cycle, algorithm, unauthorized access, data protection |