Return to Issue Details Application of cellular automata in information security systems Download Download PDF