Personal information

Activities

Works (4)

Comprehensive Testing of Software and Hardware Data Security Tools Using Virtualization

Mechanisms and Machine Science
2020 | Book chapter
EID:

2-s2.0-85078183184

Part of ISBN:

22110992 22110984

Contributors: Epishkina, A.V.; Kanner, A.M.; Kanner, T.M.
Source: Self-asserted source
Tatiana Kanner via Scopus - Elsevier

Testing Software and Hardware Data Security Tools Using the Automata Theory and the Graph Theory

Proceedings - 2020 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology, USBEREIT 2020
2020 | Conference paper
EID:

2-s2.0-85089665375

Contributors: Kanner, T.M.; Kanner, A.M.
Source: Self-asserted source
Tatiana Kanner via Scopus - Elsevier

Features of advanced training of specialists in ensuring safety of significant objects of critical information infrastructure

Bezopasnost informacionnyh tehnology
2019-09 | Journal article
Contributors: Tatiana M. Kanner
Source: check_circle
Crossref

Applicability of software testing methods to software and hardware data security tools

Global Journal of Pure and Applied Mathematics
2016 | Journal article
EID:

2-s2.0-84961167504

Part of ISBN:

09739750 09731768

Contributors: Kanner, T.M.
Source: Self-asserted source
Tatiana Kanner via Scopus - Elsevier