Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2009_3_a8, author = {E. V. Devyanina}, title = {DP-model of computer steganography system}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {85--90}, publisher = {mathdoc}, number = {3}, year = {2009}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2009_3_a8/} }
E. V. Devyanina. DP-model of computer steganography system. Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 85-90. http://geodesic.mathdoc.fr/item/PDM_2009_3_a8/
[1] Agranovskii A. V., Devyanin P. N., Khadi R. A., Cheremushkin A. V., Osnovy kompyuternoi steganografii, Ucheb. posobie dlya vuzov, Radio i svyaz, M., 2003, 152 pp.
[2] Gribunin V. G., Okov I. N., Turintsev I. V., Tsifrovaya steganografiya, SOLON-Press, M., 2002, 272 pp.
[3] Kokhanovich G. F., Puzyrenko A. Yu., Kompyuternaya steganografiya. Teoriya i praktika, MK-Press, Kiev, 2002, 288 pp.
[4] Bishop M., Computer Security: art and science, ISBN 0-201-44099-7, 2002, 1084 pp.
[5] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem, Ucheb. posobie dlya stud. vyssh. ucheb. zavedenii, Izdatelskii tsentr “Akademiya”, M., 2005, 144 pp.
[6] Devyanin P. N., Analiz bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh, Radio i svyaz, M., 2006, 176 pp.
[7] Kolegov D. N., “DP-model kompyuternoi sistemy s funktsionalno i parametricheski assotsiirovannymi s sub'ektami suschnostyami”, Vestnik Sibirskogo gosudarstvennogo aerokosmicheskogo universiteta im. akad. M. F. Reshetneva, 2009, no. 1(22), Chast 1, 49–54