@article{MAIS_2016_23_6_a7,
author = {V. A. Alexandrov and V. Desnitsky and D. Yu. Chaly},
title = {Design and security analysis of a fragment of {Internet} of {Things} telecommunication system},
journal = {Modelirovanie i analiz informacionnyh sistem},
pages = {767--776},
year = {2016},
volume = {23},
number = {6},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/MAIS_2016_23_6_a7/}
}
TY - JOUR AU - V. A. Alexandrov AU - V. Desnitsky AU - D. Yu. Chaly TI - Design and security analysis of a fragment of Internet of Things telecommunication system JO - Modelirovanie i analiz informacionnyh sistem PY - 2016 SP - 767 EP - 776 VL - 23 IS - 6 UR - http://geodesic.mathdoc.fr/item/MAIS_2016_23_6_a7/ LA - ru ID - MAIS_2016_23_6_a7 ER -
%0 Journal Article %A V. A. Alexandrov %A V. Desnitsky %A D. Yu. Chaly %T Design and security analysis of a fragment of Internet of Things telecommunication system %J Modelirovanie i analiz informacionnyh sistem %D 2016 %P 767-776 %V 23 %N 6 %U http://geodesic.mathdoc.fr/item/MAIS_2016_23_6_a7/ %G ru %F MAIS_2016_23_6_a7
V. A. Alexandrov; V. Desnitsky; D. Yu. Chaly. Design and security analysis of a fragment of Internet of Things telecommunication system. Modelirovanie i analiz informacionnyh sistem, Tome 23 (2016) no. 6, pp. 767-776. http://geodesic.mathdoc.fr/item/MAIS_2016_23_6_a7/
[1] Morgan S., Internet Trends: 2007, http://www.slideshare.net/rmesquita/morgan-stanley-technology-internet-trends
[2] Informacionnaja tehnologija. Metody i sredstva obespechenija bezopasnosti. Chast 3. Metody menedzhmenta bezopasnosti informacionnyh tehnologij, GOST R ISO/MJeK TO 13335-3-2007, 2007 (in Russian)
[3] Information technology. Security techniques. Part 1. Concepts and models for information and communications technology security management, GOST R ISO/MJeK TO 13335-1-2006, 2006 (in Russian)
[4] Richardson M., Uolles S., Zavodim Raspberry Pi, Amperka, 2013, 230 pp. (in Russian)
[5] Lutc M., Programmirovanie na Python, v. 2, Simvol-Pljus, 2011, 992 pp. (in Russian)
[6] Abraham D. G., Dolan G. M., Double G. P., “Transaction Security System”, IBM Systems Journal, 30:2 (1991), 230–243 | DOI
[7] Desnitsky V. A., Chechulin A. A., “Obobshhennaja model narushitelja i verifikacija informacionno-telekommunikacionnyh sistem so vstroennymi ustrojstvami”, Tehnicheskie nauki — ot teorii k praktike, 39, NP “SibAK”, 2014, 7–21 (in Russian)