Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2022-5-14-27
S. Dvoryankin, Nikita S. Dvoryankin, Roman A. Ustinov
The aim of this article is to study the possibility of creating a speech-like interference (SLI) based on scrambling of the protected speech signal that is resistant to noise cleaning, restoration and reconstruction of distorted speech through processing of its spectrogram images, including the use of the speaker’s voice database. Methods: applied systems analysis, digital spectral-time analysis, digital processing of signals and images, image analysis of sonograms Results: it is proposed to use as the main indicator of the security of speech information the concept of potential speech intelligibility, methods for assessing potential intelligibility are determined. An algorithm of compensationtype digital noise cleaning using image analysis-synthesis technology has been developed. The requirements for the created SLI are formed, consisting in changing the spetral-temporal envelope of speech, removing («weakening») traces of the harmonic structure of speech, equalizing the capacities of the protected speech signal and the SLI masking it. The approaches to the formation of an SLI resistant to the procedures of digital noise cleaning and reconstruction of distorted sonograms are described, proposals are presented on the methodology for evaluating the effectiveness of interference through the indicator of potential intelligibility. The results obtained will allow to better understand the work of attacking tools, develop methods and means of effectively countering possible threats, and expand the capabilities of existing speech information protection systems. The scientific novelty consists in the development of criteria for evaluating the effectiveness of speech-like interference, taking into account the capabilities of the intruder to restore the intelligibility of distorted speech messages, proposed methods for the formation of scrambler-type SLI that meet such criteria, substantiated proposals to improve existing methods for assessing and monitoring the security of speech information from its leakage through technical channels.
{"title":"SPEECH-LIKE INTERFERENCE RESISTANT TO NOISE REDUCTION METHODS AS A RESULT OF SCRAMBLING OF THE PROTECTED SPEECH","authors":"S. Dvoryankin, Nikita S. Dvoryankin, Roman A. Ustinov","doi":"10.21681/2311-3456-2022-5-14-27","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-5-14-27","url":null,"abstract":"The aim of this article is to study the possibility of creating a speech-like interference (SLI) based on scrambling of the protected speech signal that is resistant to noise cleaning, restoration and reconstruction of distorted speech through processing of its spectrogram images, including the use of the speaker’s voice database. Methods: applied systems analysis, digital spectral-time analysis, digital processing of signals and images, image analysis of sonograms Results: it is proposed to use as the main indicator of the security of speech information the concept of potential speech intelligibility, methods for assessing potential intelligibility are determined. An algorithm of compensationtype digital noise cleaning using image analysis-synthesis technology has been developed. The requirements for the created SLI are formed, consisting in changing the spetral-temporal envelope of speech, removing («weakening») traces of the harmonic structure of speech, equalizing the capacities of the protected speech signal and the SLI masking it. The approaches to the formation of an SLI resistant to the procedures of digital noise cleaning and reconstruction of distorted sonograms are described, proposals are presented on the methodology for evaluating the effectiveness of interference through the indicator of potential intelligibility. The results obtained will allow to better understand the work of attacking tools, develop methods and means of effectively countering possible threats, and expand the capabilities of existing speech information protection systems. The scientific novelty consists in the development of criteria for evaluating the effectiveness of speech-like interference, taking into account the capabilities of the intruder to restore the intelligibility of distorted speech messages, proposed methods for the formation of scrambler-type SLI that meet such criteria, substantiated proposals to improve existing methods for assessing and monitoring the security of speech information from its leakage through technical channels.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116224932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2021-5-63-74
A. Ivanov, Ivan Sprogis, Igor Shahalov
The purpose of the article: the best of the existing procedure for assessing the conformity of organizations, industrial enterprises and institutions - developers of software and hardware complexes used in weapons and military equipment. Research methods: system analysis, development of methods. Result: draft methods for checking the archive during special examinations of enterprises and organizations - applicants for a license of the Ministry of Defense of Russia for activities to create information security tools and verify the compliance of software development processes with the requirements of GOST R 56939-2016 during a special examination of licensees of the Ministry of Defense of Russia in the field of creating information security tools have been developed.
这篇文章的目的是:最好地利用现有程序来评估组织、工业企业和机构- -武器和军事装备中使用的软件和硬件综合体的开发商- -的一致性。研究方法:系统分析、开发方法。结果:制定了在对企业和组织进行特殊检查期间检查档案的方法草案-俄罗斯国防部许可申请人创建信息安全工具的活动,并在对俄罗斯国防部被许可人进行特殊检查期间验证软件开发过程是否符合GOST R 56939-2016的要求。
{"title":"Features of Licensing the Activities of Enterprises and Organizations in the Interests of the Ministries of Defense of the Russian Federation","authors":"A. Ivanov, Ivan Sprogis, Igor Shahalov","doi":"10.21681/2311-3456-2021-5-63-74","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-63-74","url":null,"abstract":"The purpose of the article: the best of the existing procedure for assessing the conformity of organizations, industrial enterprises and institutions - developers of software and hardware complexes used in weapons and military equipment. Research methods: system analysis, development of methods. Result: draft methods for checking the archive during special examinations of enterprises and organizations - applicants for a license of the Ministry of Defense of Russia for activities to create information security tools and verify the compliance of software development processes with the requirements of GOST R 56939-2016 during a special examination of licensees of the Ministry of Defense of Russia in the field of creating information security tools have been developed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125999272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2023-2-65-72
V. Averyanov, Igor Kartsan
Purpose of the article: development of new methods, algorithms and models to detect unauthorized actions of an intruder/s in relation to broadcast data represented in the form of one-photon pure states of light particles, which will allow: to strengthen the secrecy of basic security keys, improve procedures for data exchange and processing by legitimate users of the telecommunications system, expand the functionality of existing technological solutions in their classic representation. Research method: system analysis, information security assessment method. The result: risks of critical system errors for procedures of basic states measurement results matching and supposed potential possibilities of attacker to realize vulnerabilities through active phase of attacks with explicit critical outcome are presented. It is established that translation of mixed single-photon states and imposition on receiving hardware is explicitly uncontrolled, unaccountable and not contained in any algorithm of quantum protocols, which, according to the authors, is the most critical vulnerability of modern cryptographic systems based on quantum mechanics. A way to solve problems of “silent” scanning and to counteract hidden active attacks on quantum channel and particle states is proposed. The essence of the solution consists in non-orthogonality of states of a random basis vector and duplication of a main communication channel containing an information path on pulse signals broadcasting, where a known number of synchro-sentences in a backup line allows to trace an attacker. Fundamental is the knowledge of the primary-natural errors occurring at each of the stages of the formation of the main security key.
{"title":"ON PRIMARY TECHNICAL DEVICES AND REQUIREMENTS FOR QUANTUM SYSTEM SECURITY KEYS","authors":"V. Averyanov, Igor Kartsan","doi":"10.21681/2311-3456-2023-2-65-72","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-65-72","url":null,"abstract":"Purpose of the article: development of new methods, algorithms and models to detect unauthorized actions of an intruder/s in relation to broadcast data represented in the form of one-photon pure states of light particles, which will allow: to strengthen the secrecy of basic security keys, improve procedures for data exchange and processing by legitimate users of the telecommunications system, expand the functionality of existing technological solutions in their classic representation. Research method: system analysis, information security assessment method. The result: risks of critical system errors for procedures of basic states measurement results matching and supposed potential possibilities of attacker to realize vulnerabilities through active phase of attacks with explicit critical outcome are presented. It is established that translation of mixed single-photon states and imposition on receiving hardware is explicitly uncontrolled, unaccountable and not contained in any algorithm of quantum protocols, which, according to the authors, is the most critical vulnerability of modern cryptographic systems based on quantum mechanics. A way to solve problems of “silent” scanning and to counteract hidden active attacks on quantum channel and particle states is proposed. The essence of the solution consists in non-orthogonality of states of a random basis vector and duplication of a main communication channel containing an information path on pulse signals broadcasting, where a known number of synchro-sentences in a backup line allows to trace an attacker. Fundamental is the knowledge of the primary-natural errors occurring at each of the stages of the formation of the main security key.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132008671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-4-35-45
Ilya Peplov, L. Eisymont
{"title":"Methods of Dynamic Critical Path Monitoring for Better Performance and Power Efficiency in VLSI-Circuits","authors":"Ilya Peplov, L. Eisymont","doi":"10.21681/2311-3456-2019-4-35-45","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-35-45","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133552574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2022-2-72-86
O. Sheluhin, Anna Vanyushina, Alexander S. Bolshakov, Maksim Zhelnov
Purpose of work – is to evaluate the effectiveness of software identification of anonymous users in the context of the evolution of digital fingerprints on their devices. Research method. Artificial intelligence technologies, including NLP (Natural Language Processing), methods of LSA (Latent semantic analysis), as well as methods of clustering and machine learning. Objects of study are theoretical and practical issues of solving and visualizing information security problems. Results of the study. To study the impact of the evolution of digital fingerprints of analyzed devices, by alternately changing the analyzed parameters of the original fingerprint (a digital fingerprint of a browser or digital device), a database of modified fingerprints was created. A calculation technique is proposed and numerical results are presented for estimating the probability of correct and false user identifications during the evolution of the attributes of digital fingerprints. The dependence of the effectiveness of user deanonymization depending on the characteristics and properties of the variable attributes of digital fingerprints of his devices is shown. Practical relevance relevance. To improve the efficiency of anonymous user identification systems based on the analysis of device digital fingerprints. The proposed article will be useful both to specialists developing information security systems and to students studying “Information Security” course.
{"title":"The Impact of Digital Fingerprint Evolution on the Authenticity of Anonymous User Identification","authors":"O. Sheluhin, Anna Vanyushina, Alexander S. Bolshakov, Maksim Zhelnov","doi":"10.21681/2311-3456-2022-2-72-86","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-2-72-86","url":null,"abstract":"Purpose of work – is to evaluate the effectiveness of software identification of anonymous users in the context of the evolution of digital fingerprints on their devices. Research method. Artificial intelligence technologies, including NLP (Natural Language Processing), methods of LSA (Latent semantic analysis), as well as methods of clustering and machine learning. Objects of study are theoretical and practical issues of solving and visualizing information security problems. Results of the study. To study the impact of the evolution of digital fingerprints of analyzed devices, by alternately changing the analyzed parameters of the original fingerprint (a digital fingerprint of a browser or digital device), a database of modified fingerprints was created. A calculation technique is proposed and numerical results are presented for estimating the probability of correct and false user identifications during the evolution of the attributes of digital fingerprints. The dependence of the effectiveness of user deanonymization depending on the characteristics and properties of the variable attributes of digital fingerprints of his devices is shown. Practical relevance relevance. To improve the efficiency of anonymous user identification systems based on the analysis of device digital fingerprints. The proposed article will be useful both to specialists developing information security systems and to students studying “Information Security” course.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131494884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2023-1-41-57
S. Soloviev, Mikhail Tarelkin, Vasily Tekunov, Yuri Yazov
The goal of article is determine the main areas for development, composition and structure of prospective methodological support for the organization and maintenance of technical protection of information in information systems.The method of research: is summary and analysis the existing methodological support for organization and maintenance of the technical protection of information from unauthorized access and its development trends in the interests of the conversion from qualitative to quantitative procedures of substantiation requirements and selection process to build information security system in information systems. The result of the research: The factors defining the need to develop methodological support for the organization and maintenance of technical protection of information have been identified, including subject area extension of information protection, the need to move to quantitative research methods, algorithms and procedures for assessment the possibilities of implementing information security threats, the need to justify the requirements for technical protection of information and select protection measures and means. Data volume has increased dramatically and processes of information gathering and analysis are impossible without the use of corresponding special software tools and complexes. The composition and structure of prospective methodological support have been developed, including using modern methods of artificial intelligence theory (machine learning, artificial neural networks (ANNs)), the apparatus of composite Petri-Markov nets, risk theory, etc., for the tasks of categorizing the information systems and the information processed in them, identifying information security threats and vulnerabilities, as well as threat risk assessment considering time factor. It was noted that the introduction of such support into practice is impossible without the creation of software systems that automate categorization processes, quantitative risk assessments of implementing threats and building information protection systems. Scientific novelty: a systematic idea of the composition, structure and prospects of development methodological support has been identified for the organization and maintenance of technical protection of information to solve problems of categorizing the information systems and the information processed in them, forecasting, assessment the possibilities and consequences of implementing information security threats. Author contributions: Soloviev S.V. - assessment of the status and research of the prospects of development methodological support for the categorization the information system and the information processed in them; Tarelkin M.A. - study of methods of threats forecasting for information security and their prospective applications in the management of the Data Bank of information security threats of FSTEC of Russia; V.V. Tekunov - ways to build a promising system for threat forecasting to informa
{"title":"Status and Prospects of Development Methodological Support for Technical Protection of Information in Information systems","authors":"S. Soloviev, Mikhail Tarelkin, Vasily Tekunov, Yuri Yazov","doi":"10.21681/2311-3456-2023-1-41-57","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-41-57","url":null,"abstract":"The goal of article is determine the main areas for development, composition and structure of prospective methodological support for the organization and maintenance of technical protection of information in information systems.The method of research: is summary and analysis the existing methodological support for organization and maintenance of the technical protection of information from unauthorized access and its development trends in the interests of the conversion from qualitative to quantitative procedures of substantiation requirements and selection process to build information security system in information systems. The result of the research: The factors defining the need to develop methodological support for the organization and maintenance of technical protection of information have been identified, including subject area extension of information protection, the need to move to quantitative research methods, algorithms and procedures for assessment the possibilities of implementing information security threats, the need to justify the requirements for technical protection of information and select protection measures and means. Data volume has increased dramatically and processes of information gathering and analysis are impossible without the use of corresponding special software tools and complexes. The composition and structure of prospective methodological support have been developed, including using modern methods of artificial intelligence theory (machine learning, artificial neural networks (ANNs)), the apparatus of composite Petri-Markov nets, risk theory, etc., for the tasks of categorizing the information systems and the information processed in them, identifying information security threats and vulnerabilities, as well as threat risk assessment considering time factor. It was noted that the introduction of such support into practice is impossible without the creation of software systems that automate categorization processes, quantitative risk assessments of implementing threats and building information protection systems. Scientific novelty: a systematic idea of the composition, structure and prospects of development methodological support has been identified for the organization and maintenance of technical protection of information to solve problems of categorizing the information systems and the information processed in them, forecasting, assessment the possibilities and consequences of implementing information security threats. Author contributions: Soloviev S.V. - assessment of the status and research of the prospects of development methodological support for the categorization the information system and the information processed in them; Tarelkin M.A. - study of methods of threats forecasting for information security and their prospective applications in the management of the Data Bank of information security threats of FSTEC of Russia; V.V. Tekunov - ways to build a promising system for threat forecasting to informa","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"598 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134435322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2022-3-82-89
A. Parshutkin, Marina Neaskina
The purpose of the article: development of software-implemented ways to increase the security of information from leakage through spurious electromagnetic radiation of a DVI video system. Research method: search for brightness gradations of RGB primary colors that form similar levels of spurious electromagnetic radiation by enumeration of experimental data obtained from fragments of the reconstructed image. Results: the first part of the article provides a review and analysis of the literature on the features of the functioning of the video interface of the DVI standard. The main characteristics of the TMDS coding algorithm, which can affect the parameters of spurious electromagnetic radiation of the video interface of modern computer technology, are considered. The second part of the article presents an experimental setup for analyzing the relationship between the visual contrast of an image and changes in the intensity of electromagnetic spurious emissions from a DVI video system. On the basis of an experimental comparison of the intensity values of side electromagnetic radiation for different color shades specified by RGB combinations, the possibility of using such pairs of color tone combinations that, on the one hand, are acceptable for the perception of information by the operator, and, on the other hand, have practically indistinguishable levels of side effects, is shown. electromagnetic radiation. The third part of the article (this is for the existing one) presents a method developed by the authors to increase the security of information from leakage through spurious electromagnetic radiation of a DVI video system. The possibility of implementing the proposed method for reducing the information content of spurious electromagnetic radiation of a video system when displaying two-color images is shown.
{"title":"Increasing the Security of Information from Leakage Through Side Electromagnetic Emissions","authors":"A. Parshutkin, Marina Neaskina","doi":"10.21681/2311-3456-2022-3-82-89","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-3-82-89","url":null,"abstract":"The purpose of the article: development of software-implemented ways to increase the security of information from leakage through spurious electromagnetic radiation of a DVI video system. Research method: search for brightness gradations of RGB primary colors that form similar levels of spurious electromagnetic radiation by enumeration of experimental data obtained from fragments of the reconstructed image. Results: the first part of the article provides a review and analysis of the literature on the features of the functioning of the video interface of the DVI standard. The main characteristics of the TMDS coding algorithm, which can affect the parameters of spurious electromagnetic radiation of the video interface of modern computer technology, are considered. The second part of the article presents an experimental setup for analyzing the relationship between the visual contrast of an image and changes in the intensity of electromagnetic spurious emissions from a DVI video system. On the basis of an experimental comparison of the intensity values of side electromagnetic radiation for different color shades specified by RGB combinations, the possibility of using such pairs of color tone combinations that, on the one hand, are acceptable for the perception of information by the operator, and, on the other hand, have practically indistinguishable levels of side effects, is shown. electromagnetic radiation. The third part of the article (this is for the existing one) presents a method developed by the authors to increase the security of information from leakage through spurious electromagnetic radiation of a DVI video system. The possibility of implementing the proposed method for reducing the information content of spurious electromagnetic radiation of a video system when displaying two-color images is shown.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133846320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-5-02-11
I. Kalyaev, A. Antonov, V. Zaborovsky
{"title":"Architecture of Reconfigurable Heterogeneous Distributed Supercomputer System for Solving Problems of Intelligent Data Processing in the Era of Digital Transformation of the Economy","authors":"I. Kalyaev, A. Antonov, V. Zaborovsky","doi":"10.21681/2311-3456-2019-5-02-11","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-02-11","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124198851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-1-25-34
Yuri Yazov, Export Control, O. Avsentyev, I. Rubtsova, Law
{"title":"On the Evaluation of the Effectiveness Information Protection in Electronic Document Management Systems","authors":"Yuri Yazov, Export Control, O. Avsentyev, I. Rubtsova, Law","doi":"10.21681/2311-3456-2019-1-25-34","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-1-25-34","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115965267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}