Author of the publication

Conflict Analysis in the "Subject-to-Subject" Security System.

, , , , and . CPITS, volume 3421 of CEUR Workshop Proceedings, page 56-66. CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conflict Analysis in the "Subject-to-Subject" Security System., , , , and . CPITS, volume 3421 of CEUR Workshop Proceedings, page 56-66. CEUR-WS.org, (2023)Information Security Risk Management using Cognitive Modeling (short paper)., , , , and . CPITS II, volume 3550 of CEUR Workshop Proceedings, page 297-305. CEUR-WS.org, (2023)Information Security Risk Analysis SWOT (short paper)., , , , and . CPITS I, volume 2923 of CEUR Workshop Proceedings, page 309-317. CEUR-WS.org, (2021)Encryption Method for Systems with Limited Computing Resources (short paper)., , , , and . CPITS, volume 3288 of CEUR Workshop Proceedings, page 142-148. CEUR-WS.org, (2022)Model of Informational and Cyber Security Synthetic Learning Environment Step-by-Step Implementation., , , , and . CPITS II (1), volume 3187 of CEUR Workshop Proceedings, page 89-102. CEUR-WS.org, (2021)Conflict Model of Radio Engineering Systems under the Threat of Electronic Warfare., , , , and . CPITS, volume 3654 of CEUR Workshop Proceedings, page 290-300. CEUR-WS.org, (2024)Conflicting Subsystems in the Information Space: A Study at the Software and Hardware Levels., , , , and . CPITS, volume 3654 of CEUR Workshop Proceedings, page 333-342. CEUR-WS.org, (2024)