The Method of Calculation of Probability of Realization of Threats of Information With the Limited Access From an Internal User Violator
Information systems and technologies security
doi 10.17721/ists.2019.1.19-26
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2019
Authors
Publisher
Taras Shevchenko National University of Kyiv