Open Access
Issue
E3S Web Conf.
Volume 279, 2021
III International Conference “Energy Efficiency and Energy Saving in Technical Systems” (EEESTS-2021)
Article Number 03029
Number of page(s) 8
Section Energy Efficiency and Energy Saving in the Technological Processes of the Agro-Industrial Complex
DOI https://doi.org/10.1051/e3sconf/202127903029
Published online 01 July 2021
  1. S.V. Belokurov, J.E. Lvovich, Noev A.N. et al., Mathematical modeling of mechanisms for detecting threats of information leakage through parametric channels, in Proceedings of the International Conference “Applied Mathematics, Computational Science and Mechanics: Current Problems, ”J. Phys.: Conf. Ser., 1202. 012012 (2019) [Google Scholar]
  2. S.V. Zapechnikov, N.G. Miloslavskaya, A.I. Tolstoy [et al] Information security of open systems: a textbook for universities. In 2 volumes. Volume 1. Threats, vulnerabilities, attacks and approaches to protection. Moscow (2006) [Google Scholar]
  3. Lamonov A.V. Safety of information technologies, 1 (2007) [Google Scholar]
  4. V.A. Minaev, S.V. Skryl, S.V. Dvoryankin [et al] Informatika: textbook for higher educational institutions of the Ministry of Internal Affairs of Russia. Volume 1: Informatics: Conceptual Foundations. Moscow (2008) [Google Scholar]
  5. Adam T. Elsworth, Electronic Warfare. Nova Science Publishers, Inc. (2011) [Google Scholar]
  6. Anthimos Alexandros Tsirigotis, Cybernetics, Warfare and Discourse: The Cybernetisation of Warfare in Britain. Palgrave Macmillan (2017) [Google Scholar]
  7. Darren Death, Information Security Handbook. Packt Publishing (2017) [Google Scholar]
  8. Michael E. Whitman and Herbert J. Mattord, Principles of Information Security. Cengage Learning (2014) [Google Scholar]
  9. Novikov D. New Frontiers in Information and Production Systems Modelling and Analysis: Incentive Mechanisms, Competence Management, Knowledge-based Production. Springer (2017) [Google Scholar]
  10. Raymond Pompon. IT Security Risk Control Management. Apress (2016) [Google Scholar]
  11. Richard A. Clarke, Robert Knake. Cyber War: The Next Threat to National Security and What to Do About It Paperback (2012) [Google Scholar]
  12. Richard A. Poisel. Information Warfare and Electronic Warfare Systems. Artech House (2013) [Google Scholar]
  13. John R. Vacca, Syngress. Network and System Security, Second Edition, 2nd Edition (2016) [Google Scholar]
  14. William Stallings, Lawrie Brown. Computer Security: Principles and Practice, 3rd Edition. Pearson (2014) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.