PROTECTION OF INFORMATION IN CRITICAL APPLICATION DATA PROCESSING SYSTEMS
Abstract
Keywords
Full Text:
PDFReferences
Ahmad D., Dubrovskiy A. & Flinn Х. (2005). Defense from the hackers of corporate networks. Moscow. Companies AyTi; DMK - Press.
Chertov R., Fahmy S., & Shroff N. (2006). Emulation versus simulation: A case study of TCP-targeted denial of service attacks. In Proc. of the 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, p. 10.
Chi S., Park J., Jung K. & Lee J. (2001). Network Security Modeling and Cyber At-tack Simulation Methodology//LNCS. Vol. 2119.
Goldman R. (2002). A Stochastic Model for Intrusions // LNCS. Vol. 2516.
Gorodetski V. & Kotenko I. (2002). Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool. RAID 2000 // LNCS. Vol. 2516.
Harel D. (1987). Visual Formalism for Complex Systems, Science of Computer Programming 8. p. 231-274.
Lahno V. & Petrov A. (2010) . Modelling of discrete recognition and information vulnerability search procedures. TEKA. Volume XI A. p. 137-144.
Lahno V. & Petrov A. (2011). Ensuring security of automated information systems, transportation companies with the intensification of traffic. Lugansk. VNU.
Rogozin Е. А. Е- network presentation of functioning of the perspective programmatic system of priv. Journal - Questions of information security. - 2003. N 3(62). - P. 71-74.
Shun-Chieh Lin & Shian-Shyong Tseng. (2004). Constructing detection knowledge for DDoS intrusion tolerance // Expert Systems with Applications. - 2004. - V. 27. P. 379–390.
Smirniy M. & Lahno V. (2009). The research of the conflict request threads in the data protection systems. Proceedings of Lugansk branch of the International Academy of Informatization. V 2(20). р. 23-30.
Refbacks
- There are currently no refbacks.

