Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
4 SI
Page No.
6837 - 6844
References
Demidov, V., N. Silnikov and A. Shaitanov, 2000. Technique of Communication of Department of Internal Affairs. Saint Petersburg State University, Saint Petersburg, Russia, Pages: 95.
Goncharov, M., 2012. Model and method for analyzing risks of computer systems information security based on hybrid fuzzy models. Neurocomputers Dev. Appl., 5: 9-15.
Grigoryev, V. and O. Lagutenko, 2005. Networks and Wireless Access Systems. Eco-Trends, Moscow, Russian, Pages: 384.
Horev, A., 1998. Protection of Information from Leaks by Technical Channels. Gostehkomissija Rossii, Moscow, Russia, Pages: 320.
Kam, T., T. Villa, R. Brayton and A. Sangiovanni-Vincentelli, 1997. Synthesis of Finite State Machines: Functional Optimization. Kluwer Academic Publishers, Boston, Massachusetts, Pages: 282.
Lagutin, V., 1997. Leakage and Information Protection in Telephone Channels. Publisher Energoatomizdat, Moscow, Russian, Pages: 298.
Lukatsky, A., 2005. Security of wireless networks. Technol. Means Commun., 1: 45-67.
Lukatsky, A., 2006. Preventing Network Attacks: Technologies and Solutions. Ekspress-Elektronika, Moscow, Russia, Pages: 78.
Martsenyuk, M., 2014. Reduction of the final fuzzy automation to the fuzzy combinational scheme with the memory block. Sci. Tech. Bull., Vol. 6,
Mordeson, J.N. and S.M. Davender, 2002. Fuzzy Automata and Languages: Theory and Applications. CRC Press, Boca Raton, Florida, USA., Pages: 576.
Olifer, V. and N. Olifer, 2006. Computer Networks: Principles, Technologies and Protocols for Network Design. John Wiley & Sons, Hoboken, New Jersey, USA., ISBN:9780470869826, Pages: 973.
Pollin, D. and M. Maxim, 2014. Security of Wireless Networks. Dmk Press, Moscow, Russia, Pages: 288.
Stallings, W., 2004. Wireless Communications and Networks. Pearson, London, England, UK., Pages: 576.
Vishnevsky, V. and А. Lyakhov, 2005. Broadband Wireless Data Transmission Networks. Eco-Trends, Moscow, Russian, Pages: 592.