DP-model application for network security analysis
Prikladnaâ diskretnaâ matematika, no. 1 (2008), pp. 71-87
Voir la notice de l'article provenant de la source Math-Net.Ru
The closure of the DP-models is offered. The algorithms of finding closure are described. Application of the models for network security analyses is considered. REM and VTG topological models are formalized in terms of DP-model theory.
@article{PDM_2008_1_a12,
author = {D. N. Kolegov},
title = {DP-model application for network security analysis},
journal = {Prikladna\^a diskretna\^a matematika},
pages = {71--87},
publisher = {mathdoc},
number = {1},
year = {2008},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/PDM_2008_1_a12/}
}
D. N. Kolegov. DP-model application for network security analysis. Prikladnaâ diskretnaâ matematika, no. 1 (2008), pp. 71-87. http://geodesic.mathdoc.fr/item/PDM_2008_1_a12/