Methods for the protection of transmitted information system remote monitoring and control high-tech objects
There is a view on the methods for protection of the information transferred between a remote object and the centre for support system monitoring, control, and management of critical technologies. The item offers an imito-protection algorithm reducing the likelihood of imposing false data.
Saved in:
| Main Authors: | I. A. Kalmykov, V. P. Pashintsev, O. V. Velts, M. I. Kalmykov |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
North Caucasus Federal University
2022-05-01
|
| Series: | Вестник Северо-Кавказского федерального университета |
| Subjects: | |
| Online Access: | https://vestnikskfu.elpub.ru/jour/article/view/1633 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
METHODS OF SOLVING THE PATTERN RECOGNITION PROBLEM USING RESIDUE NUMBER SYSTEM
by: Nikolay Ivanovich Chervyakov, et al.
Published: (2022-09-01) -
THE HIGH-SPEED ALGORITHM OF DIVISION OF MODULAR NUMBERS BASED ON CHINESE REMINDER THEOREM WITH FRACTIONS
by: Nikolay Ivanovich Chervyakov, et al.
Published: (2022-10-01) -
Effective algorithm of the numbers division in the system of residual classes on the basis of approximate method
by: Nikolay Ivanovich Chervyakov, et al.
Published: (2022-09-01) -
Interval-index technology of synthesis of the parallel algorithms for modular-point code conversion with the table-summation configuration
by: A. A. Kolyada, et al.
Published: (2022-09-01) -
DIGITAL FILTERS IN TWO-STAGE RESIDUE NUMBER SYSTEM WITN SPRCIAL MODULES
by: Nikolay Ivanovich Chervyakov, et al.
Published: (2022-09-01)