Open Access
E3S Web Conf.
Volume 224, 2020
Topical Problems of Agriculture, Civil and Environmental Engineering (TPACEE 2020)
Article Number 01042
Number of page(s) 9
Section Mathematical Models for Environmental Monitoring and Assessment
Published online 23 December 2020
  1. Buzov G A 2005 Protection against information leakage through technical channels: the manual (Moscow: Hotline-Telecom) p 416 [Google Scholar]
  2. Volkov D S 2014 Scientific search 25 4-6 [Google Scholar]
  3. 2002 Collection of temporary methods for assessing the security of confidential information from leakage through technical channels (Moscow: State Technical Commission Of Russia) [Google Scholar]
  4. Russian Federation Standard GOST R 51275-2006 [Google Scholar]
  5. Durakovsky A P 2015 Control of speech information security in premises Certification tests of auxiliary technical means and systems for information security requirements: Tutorial (Moscow: National Research Nuclear University MEPhI) p 152 [Google Scholar]
  6. Emelyanov S L 2010 Information processing Systems 3 20-23 [Google Scholar]
  7. Zheleznyak, V K 2000 Special technique 4 39-45 [Google Scholar]
  8. Zaitsev A P 2009 Technical means and methods of information protection (Moscow: Mashinostroenie) p 507 [Google Scholar]
  9. Pavlovsky Yu N 2000 Simulation models and systems (M: fazis: VC RAS) p 134 [Google Scholar]
  10. Development patterns: MVC vs MVP vs MVVM vs MVI https://habrcom/ru/post/344184/ [Google Scholar]
  11. Skripnik D A General issues of technical protection of information http://wwwintuitru/goods_store/ebooks/8563 [Google Scholar]
  12. 2001 Special requirements and recommendations for the protection of confidential information, the state Commission of Russia (Moscow) [Google Scholar]
  13. Titov A A 2010 Engineering and technical protection of information: A textbook for students of the specialties Organization and technology of information protection (Tomsk: Tomsk state University of control systems and Radioelectronics) p 197 [Google Scholar]
  14. Torokin A A 2005 Engineering and technical protection of information (Moscow: Helios ARV) [Google Scholar]
  15. Chaliapin D B 2009 The world of security 5 47-53 [Google Scholar]
  16. Horev A A 2009 Information Protection Insider trading 1 42-52 [Google Scholar]
  17. Horev A A 2009 Special technique 5 12-26 [Google Scholar]
  18. Horev A A 1998 Protection of information from leakage through technical channels Part 1 Technical channels for information leakage (Moscow: state technical Commission of the Russian Federation) p 320 [Google Scholar]
  19. Horev A A 2000 Methods and means of information protection Textbook (Moscow: MO RF) p 316 [Google Scholar]
  20. Vijini Mallawaarachchi Towards Data Science https://towardsdatasciencecom/10common-software-architectural-patterns-in-a-nutshell-a0b47a1e9013 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.