{"title":"计算机智能对电信网络的保护方法","authors":"U. Starodubcev, A. Klimenko, E. G. Balenko","doi":"10.1109/EASTСONF.2019.8725402","DOIUrl":null,"url":null,"abstract":"The authors of the article suggest the method that allows to ensure increase of security of the information and telecommunication network and the object of the critically important infrastructure as a whole.","PeriodicalId":261560,"journal":{"name":"2019 International Science and Technology Conference \"EastСonf\"","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Protection Method for Telecommunication Networks from the Computer Intelligence\",\"authors\":\"U. Starodubcev, A. Klimenko, E. G. Balenko\",\"doi\":\"10.1109/EASTСONF.2019.8725402\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The authors of the article suggest the method that allows to ensure increase of security of the information and telecommunication network and the object of the critically important infrastructure as a whole.\",\"PeriodicalId\":261560,\"journal\":{\"name\":\"2019 International Science and Technology Conference \\\"EastСonf\\\"\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Science and Technology Conference \\\"EastСonf\\\"\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EASTСONF.2019.8725402\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Science and Technology Conference \"EastСonf\"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EASTСONF.2019.8725402","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Protection Method for Telecommunication Networks from the Computer Intelligence
The authors of the article suggest the method that allows to ensure increase of security of the information and telecommunication network and the object of the critically important infrastructure as a whole.