MODELS, METHODS AND INFORMATION TECHNOLOGIES OF PROTECTION OF CORPORATE SYSTEMS BASED ON INTELLECTUAL IDENTIFICATION OF THREATS
Abstract
Keywords
Full Text:
PDFReferences
Ahmad, D., Dubrovskiy, A., & Flinn, Х. (2005). Defense from the hackers of corporate networks. Moscow: Companies AyTi; DMK - Press.
Chi, S., Park, J., Jung, K., & Lee, J. (2001). Network Security Modeling and Cyber At-tack Simulation Methodology (Vol. 2119). LNCS. Vol. 2119. Retrieved from http://link.springer.com/chapter/10.1007%2F3-540-47719-5_26
Daston, L. (1988). Classical Probability in the Enlightenment. Princeton Univ Press.
ISO/IEC 15408-1:2009. (2009). Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model. ISO.
Kolodgy, C. J. (2014). Worldwide Security and Vulnerability Management 2004-2014. Manchester: National Computer Center Publications.
Lahno, V., & Petrov, A. (2010). Modelling of discrete recognition and information vulnerability search procedures (Vol. XI A). TEKA.
Lahno, V., & Petrov, A. (2011). Ensuring security of automated information systems, transportation companies with the intensification of traffic. Lugansk.
Lahno, V., & Petrov, A. (2012). Modeling information security system of transport enterprises. In H. H. Marek Dudek (Ed.), Management and production engineering (pp. 221-248). ATH. Academia Techniczno – Humanistyczna of Bielsko-Biala.
Mirkovic, J., Dietrich, S., Dittrich, D., & Reiher, P. (2004). Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall PTR.
Trivedi, K. S., Kim, D. S., & Arpan, R. (2001). Dependability and Security Models. Durham, NC, USA: Duke University Department of Electrical and Computer Engineering .
Xiang, Y., Zhou, W., & Chowdhury, M. (2004). A Survey of Active and Passive Defence Mechanisms against DDoS Attacks. Technical Report, TR C04/02. Australia: School of Information Technology, Deakin University.
Refbacks
- There are currently no refbacks.

