Media Coverage of this Article
Found additional news media or blog coverage for the article? Please contact us at
submission@sciepub.com
.
Related keywords
threat
information
automated system
technical protection of information
complex system of information security
information security product
unauthorized access
technical task
software
criteria of choice
method