Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MAIS_2016_23_6_a7, author = {V. A. Alexandrov and V. Desnitsky and D. Yu. Chaly}, title = {Design and security analysis of a fragment of {Internet} of {Things} telecommunication system}, journal = {Modelirovanie i analiz informacionnyh sistem}, pages = {767--776}, publisher = {mathdoc}, volume = {23}, number = {6}, year = {2016}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MAIS_2016_23_6_a7/} }
TY - JOUR AU - V. A. Alexandrov AU - V. Desnitsky AU - D. Yu. Chaly TI - Design and security analysis of a fragment of Internet of Things telecommunication system JO - Modelirovanie i analiz informacionnyh sistem PY - 2016 SP - 767 EP - 776 VL - 23 IS - 6 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/MAIS_2016_23_6_a7/ LA - ru ID - MAIS_2016_23_6_a7 ER -
%0 Journal Article %A V. A. Alexandrov %A V. Desnitsky %A D. Yu. Chaly %T Design and security analysis of a fragment of Internet of Things telecommunication system %J Modelirovanie i analiz informacionnyh sistem %D 2016 %P 767-776 %V 23 %N 6 %I mathdoc %U http://geodesic.mathdoc.fr/item/MAIS_2016_23_6_a7/ %G ru %F MAIS_2016_23_6_a7
V. A. Alexandrov; V. Desnitsky; D. Yu. Chaly. Design and security analysis of a fragment of Internet of Things telecommunication system. Modelirovanie i analiz informacionnyh sistem, Tome 23 (2016) no. 6, pp. 767-776. http://geodesic.mathdoc.fr/item/MAIS_2016_23_6_a7/
[1] Morgan S., Internet Trends: 2007, http://www.slideshare.net/rmesquita/morgan-stanley-technology-internet-trends
[2] Informacionnaja tehnologija. Metody i sredstva obespechenija bezopasnosti. Chast 3. Metody menedzhmenta bezopasnosti informacionnyh tehnologij, GOST R ISO/MJeK TO 13335-3-2007, 2007 (in Russian)
[3] Information technology. Security techniques. Part 1. Concepts and models for information and communications technology security management, GOST R ISO/MJeK TO 13335-1-2006, 2006 (in Russian)
[4] Richardson M., Uolles S., Zavodim Raspberry Pi, Amperka, 2013, 230 pp. (in Russian)
[5] Lutc M., Programmirovanie na Python, v. 2, Simvol-Pljus, 2011, 992 pp. (in Russian)
[6] Abraham D. G., Dolan G. M., Double G. P., “Transaction Security System”, IBM Systems Journal, 30:2 (1991), 230–243 | DOI
[7] Desnitsky V. A., Chechulin A. A., “Obobshhennaja model narushitelja i verifikacija informacionno-telekommunikacionnyh sistem so vstroennymi ustrojstvami”, Tehnicheskie nauki — ot teorii k praktike, 39, NP “SibAK”, 2014, 7–21 (in Russian)