Methods of constructing a model of intruder in corporation

Бесплатный доступ

In the article the different methods of constructing of the model intruder, and estimates of the resources it requires are presented. The purpose of the offender is confidential corporate data. By the above processes mathematical methods include: linear algorithm theory, the theory of Markov processes and others methods had been applied.

Короткий адрес:

IDR: 148160151

Статья научная