Vol-1836⫷ Vol-1837 ⫸Vol-1838
urn:nbn:de:0074-1837-0


Vol-1837/paper24⫷Vol-1837/paper25⫸Vol-1837/paper26

Mathematical Modelling of the Process for Impact on Automated Information System Security of Threats Access to Restricted Information