Abstract: In this paper, the issue of modeling the transformations of information links in the architecture of cybersecurity of systems with discretionary access control on graphs using the formal ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results