For example,Бобцов

THE EFFICIENCY ESTIMATION OF THE INTRUDER ATTACKS IN THE PROCESS OF HIS MODEL CREATION

Annotation

  The design of the security information system always has the stage of the intruder model creation. A well known approach is the usage of violator characteristics as the basis for estimation of his influence on the security system. The changing of the protected object behavior can be used for the estimation of the security violator actions.

Читать текст статьи

Keywords

Articles in current issue