For example,Бобцов

INFORMATION SYSTEMS SECURITY COVERAGE BASED ON ATTACK TREE ANALYSIS

Annotation

Presentation of IT security enhanced model for critical systems has been made, analysis of critical IT system threats has been carried out, attack tree methodology has been reviewed and enhanced parallel automata for simulation of attack cases disclosure has been developed and investigated.

Читать текст статьи

Keywords

Articles in current issue