Journal
Scientific and technical journal of information technologies, mechanics and optics
UDK004.056.4
Issue:2 (66)
The design of the security information system always has the stage of the intruder model creation. A well known approach is the usage of violator characteristics as the basis for estimation of his influence on the security system. The changing of the protected object behavior can be used for the estimation of the security violator actions.