DP-model application for network security analysis
Prikladnaâ diskretnaâ matematika, no. 1 (2008), pp. 71-87
Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

The closure of the DP-models is offered. The algorithms of finding closure are described. Application of the models for network security analyses is considered. REM and VTG topological models are formalized in terms of DP-model theory.
@article{PDM_2008_1_a12,
     author = {D. N. Kolegov},
     title = {DP-model application for network security analysis},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {71--87},
     year = {2008},
     number = {1},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2008_1_a12/}
}
TY  - JOUR
AU  - D. N. Kolegov
TI  - DP-model application for network security analysis
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2008
SP  - 71
EP  - 87
IS  - 1
UR  - http://geodesic.mathdoc.fr/item/PDM_2008_1_a12/
LA  - ru
ID  - PDM_2008_1_a12
ER  - 
%0 Journal Article
%A D. N. Kolegov
%T DP-model application for network security analysis
%J Prikladnaâ diskretnaâ matematika
%D 2008
%P 71-87
%N 1
%U http://geodesic.mathdoc.fr/item/PDM_2008_1_a12/
%G ru
%F PDM_2008_1_a12
D. N. Kolegov. DP-model application for network security analysis. Prikladnaâ diskretnaâ matematika, no. 1 (2008), pp. 71-87. http://geodesic.mathdoc.fr/item/PDM_2008_1_a12/