Methods of constructing a model of intruder in corporation
Автор: Lebedeva T.V.
Статья в выпуске: 4, 2013 года.
In the article the different methods of constructing of the model intruder, and estimates of the resources it requires are presented. The purpose of the offender is confidential corporate data. By the above processes mathematical methods include: linear algorithm theory, the theory of Markov processes and others methods had been applied.
Короткий адрес: https://sciup.org/148160151