2019
DOI: 10.1088/1742-6596/1202/1/012012
|View full text |Cite
|
Sign up to set email alerts
|

Mathematical modeling of mechanisms for detecting threats of information leakage through parametric channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…These studies are a continuation of the comprehensive experiment described in papers [1][2][3][4]. Assessment of the effectiveness of mechanisms for detecting threats to information leakage through parametric channels, in accordance with the above methodology, we will consider in relation to the typical characteristics of illegal actions to intercept information through the channels of the type under consideration and the typical characteristics of mechanisms for detecting threats to information leakage.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…These studies are a continuation of the comprehensive experiment described in papers [1][2][3][4]. Assessment of the effectiveness of mechanisms for detecting threats to information leakage through parametric channels, in accordance with the above methodology, we will consider in relation to the typical characteristics of illegal actions to intercept information through the channels of the type under consideration and the typical characteristics of mechanisms for detecting threats to information leakage.…”
Section: Resultsmentioning
confidence: 99%
“…The following expressions (1) -(15) are mathematical models for estimation of average values of time of realization of operation modes of TCP during illegal actions on interception of information via parametric channels. In accordance with the order of operations, given in [1,4], performed by an intruder in the process of configuration of AP equipment through the channels of acousto-electrical transformations, HF irradiation, parasitic (auto) generation and HF imposition, the average value  (p11) of the random value of time, spent by an intruder on the realization of this mode of TCR operation is determined in accordance with the expression:…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…As a rule, in the system A, the behavior of the intruder is described by a probabilistic model, by constructing a list of possible threats. The set of actions of the system A, as well as actions coming from the external environment, namely the system B (external factors) carry out all the impacts on the system S (ISB) [1][2][3].…”
Section: Methodsmentioning
confidence: 99%