期刊论文详细信息
Scientific and Practical Cyber Security Journal
Models of interaction of a potentially dangerous terrorist group and the security service on a protected object
M. Brailovskyi*1 
关键词: external violator;    internal violator;    object;    security service;    terrorist group;   
DOI  :  
学科分类:数学(综合)
来源: Scientific Cyber Security Association
PDF
【 摘 要 】

In this paper, we analyze the models of a terrorist group (criminal mechanism), its deployment, as well as the actions of a terrorist group and security services on the protected object.

【 授权许可】

CC BY-NC-ND   

【 预 览 】
附件列表
Files Size Format View
RO201904026050326ZK.pdf 492KB PDF download
  文献评价指标  
  下载次数:6次 浏览次数:6次