1999
DOI: 10.1016/s1474-6670(17)56917-7
|View full text |Cite
|
Sign up to set email alerts
|

Algebraic approach on fuzzy control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 0 publications
1
2
0
Order By: Relevance
“…2), which allows to assert the presence of a data leak in the information transmission channel. The formulated conclusions about the physical justification of the results obtained do not contradict similar conclusions obtained by other authors about the possibility of detecting data leaks in information systems [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. The algorithm for searching for the associative dependence of control features for quickly identifying the presence of a data leak should be constantly used during the operation of the information transmission channel.…”
Section: Discussion Of the Results Of Developing A Methods For Synthe...supporting
confidence: 76%
See 2 more Smart Citations
“…2), which allows to assert the presence of a data leak in the information transmission channel. The formulated conclusions about the physical justification of the results obtained do not contradict similar conclusions obtained by other authors about the possibility of detecting data leaks in information systems [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. The algorithm for searching for the associative dependence of control features for quickly identifying the presence of a data leak should be constantly used during the operation of the information transmission channel.…”
Section: Discussion Of the Results Of Developing A Methods For Synthe...supporting
confidence: 76%
“…The conducted analysis [2,3,5] shows that expert methods and the method based on the calculation of the correlation between the characteristics are most often used to determine the dependence between the characteristics [5][6][7][8][9][10][11][12][13][14][15][16][17][18].…”
Section: Literature and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…This decision depends on the method of identifying the channel of information leakage (technical channels of information leakage), the means of information leakage (technical means of espionage), the software speed of information transmission, and the information dissemination program. When solving such a problem, the time required to determine the threat and methods of influence to eliminate it is also calculated [4].…”
Section: Development Of a Structural Diagram Of Infor Mation Exchange...mentioning
confidence: 99%