Methods for the protection of transmitted information system remote monitoring and control high-tech objects
There is a view on the methods for protection of the information transferred between a remote object and the centre for support system monitoring, control, and management of critical technologies. The item offers an imito-protection algorithm reducing the likelihood of imposing false data.
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
North Caucasus Federal University
2022-05-01
|
| Series: | Вестник Северо-Кавказского федерального университета |
| Subjects: | |
| Online Access: | https://vestnikskfu.elpub.ru/jour/article/view/1633 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!