Creation model of threat and violations information for test object using ontology testing integrated information security system (IISS)
Prombles in programming 2014; 4: 48-58
Saved in:
| Date: | 2019 |
|---|---|
| Main Author: | Koltiik, M.A. |
| Format: | Article |
| Language: | Russian |
| Published: |
PROBLEMS IN PROGRAMMING
2019
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/683 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
-
System-ontological analysis the subject area of testing integrated information security system (IISS)
by: Koltyk, M.A.
Published: (2025) -
The problems of massive construction of the integrated information security system (IISS) and a ways of their solution
by: Koltyk, M.A.
Published: (2025) -
Methods and ways for realization of the automated support testing of the integrated information security system
by: Koltyk, M. A.
Published: (2025) -
Information threats and security services
by: Antonyuk, A.A., et al.
Published: (2015) -
The use of ontological knowledge for multi-criteria comparison of complex information objects
by: Rogushina, J.V., et al.
Published: (2023)