DP-model application for network security analysis
Prikladnaâ diskretnaâ matematika, no. 1 (2008), pp. 71-87.

Voir la notice de l'article provenant de la source Math-Net.Ru

The closure of the DP-models is offered. The algorithms of finding closure are described. Application of the models for network security analyses is considered. REM and VTG topological models are formalized in terms of DP-model theory.
@article{PDM_2008_1_a12,
     author = {D. N. Kolegov},
     title = {DP-model application for network security analysis},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {71--87},
     publisher = {mathdoc},
     number = {1},
     year = {2008},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2008_1_a12/}
}
TY  - JOUR
AU  - D. N. Kolegov
TI  - DP-model application for network security analysis
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2008
SP  - 71
EP  - 87
IS  - 1
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2008_1_a12/
LA  - ru
ID  - PDM_2008_1_a12
ER  - 
%0 Journal Article
%A D. N. Kolegov
%T DP-model application for network security analysis
%J Prikladnaâ diskretnaâ matematika
%D 2008
%P 71-87
%N 1
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2008_1_a12/
%G ru
%F PDM_2008_1_a12
D. N. Kolegov. DP-model application for network security analysis. Prikladnaâ diskretnaâ matematika, no. 1 (2008), pp. 71-87. http://geodesic.mathdoc.fr/item/PDM_2008_1_a12/