Methods of constructing a model of intruder in corporation
Автор: Lebedeva T.V.
Рубрика: Защита информации и информационная безопасность
Статья в выпуске: 4, 2013 года.
Бесплатный доступ
In the article the different methods of constructing of the model intruder, and estimates of the resources it requires are presented. The purpose of the offender is confidential corporate data. By the above processes mathematical methods include: linear algorithm theory, the theory of Markov processes and others methods had been applied.
Короткий адрес: https://sciup.org/148160151
IDR: 148160151
Статья научная