Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2009_3_a9, author = {D. N. Kolegov}, title = {Modeling network computer systems with vulnerabilities}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {91--99}, publisher = {mathdoc}, number = {3}, year = {2009}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2009_3_a9/} }
D. N. Kolegov. Modeling network computer systems with vulnerabilities. Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 91-99. http://geodesic.mathdoc.fr/item/PDM_2009_3_a9/
[1] Artz M., NETspa, A Network Security Planning Architecture, M. S. Thesis, Massachusetts Institute of Technology, Cambridge, 2002
[2] Shahriary H. R. et al., “Network Vulnerability Analysis Thorough Vulnerability Take-Grant Model”, Proc. of 7th International Conference on Information and Communications Security, 2005
[3] Danforth M., Models for Threat Assessment in Networks, Ph. D. dissertation, University of California, Davis, 2006
[4] Jajodia S., “Topological Analysis of Network Attack Vulnerability”, Managing Cyber Threats: Issues, Approaches and Challenges, 2003
[5] Sheyner O., Scenario Graphs and Attack Graphs, Ph. D. dissertation, Carnegie Mellon University, Pittsburgh, 2004
[6] Devyanin P. N., Analiz bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh, Radio i svyaz, M., 2006, 176 pp.
[7] Kolegov D. N., “DP-model kompyuternoi sistemy s funktsionalno i parametricheski assotsiirovannymi s sub'ektami suschnostyami”, Vestnik Sibirskogo gosudarstvennogo aerokosmicheskogo universiteta imeni akademika M. F. Reshetneva, 2009, no. 1(22), Chast 1, 49–54
[8] Kolegov D. N., “Analiz bezopasnosti informatsionnykh potokov po pamyati v kompyuternykh sistemakh s funktsionalno i parametricheski assotsiirovannymi suschnostyami”, Prikladnaya diskretnaya matematika, 2009, no. 1(3), 117–125
[9] Souppaya M. et al., Technical Guide to Information Security Testing and Assessment, Recommendations of the National Institute of Standards and Technology, 2008
[10] Bezopasnost informatsionnykh tekhnologii. Kontseptsiya otsenki sootvetstviya avtomatizirovannykh sistem trebovaniyam bezopasnosti informatsii, FSTEK Rossii. Rukovodyaschii dokument, M., 2004
[11] Burenin P. V., “Podkhody k postroeniyu DP-modeli failovykh sistem”, Prikladnaya diskretnaya matematika, 2009, no. 1(3), 93–112
[12] Kasperskii K., Tekhnika setevykh atak. T. 1: Priemy protivodeistviya, SOLON-press, M., 2001, 400 pp.
[13] Koziol Dzh., Lichfild D., Eitel D. i dr., Iskusstvo vzloma i zaschity sistem, Piter, SPb., 2006, 416 pp.
[14] Proskurin V. G., Krutov S. V., Matskevich I. V., Zaschita v operatsionnykh sistemakh, Ucheb. posobie dlya vuzov, Radio i svyaz, M., 2000, 168 pp.
[15] McNab C., Network Security Assessment, second edition, ISBN-10:0-596-51030-6, 2007, 478 pp.
[16] Baza uyazvimostei SecurityFocus, [Elektronnyi resurs]. Rezhim dostupa: http://www.securityfocus.com/bid
[17] Baza uyazvimostei NVD, [Elektronnyi resurs]. Rezhim dostupa: http://nvd.nist.gov
[18] Kolegov D. N., “Primenenie DP-modelei dlya analiza zaschischennosti setei”, Prikladnaya diskretnaya matematika, 2008, no. 1, 71–87