Methods for the protection of transmitted information system remote monitoring and control high-tech objects

There is a view on the methods for protection of the information transferred between a remote object and the centre for support system monitoring, control, and management of critical technologies. The item offers an imito-protection algorithm reducing the likelihood of imposing false data.

Saved in:
Bibliographic Details
Main Authors: I. A. Kalmykov, V. P. Pashintsev, O. V. Velts, M. I. Kalmykov
Format: Article
Language:Russian
Published: North Caucasus Federal University 2022-05-01
Series:Вестник Северо-Кавказского федерального университета
Subjects:
Online Access:https://vestnikskfu.elpub.ru/jour/article/view/1633
Tags: Add Tag
No Tags, Be the first to tag this record!