@article{ZNSL_2008_352_a4,
author = {K. N. Mishin},
title = {The imitation modelling of anomalies in computer nets},
journal = {Zapiski Nauchnykh Seminarov POMI},
pages = {120--129},
year = {2008},
volume = {352},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/ZNSL_2008_352_a4/}
}
K. N. Mishin. The imitation modelling of anomalies in computer nets. Zapiski Nauchnykh Seminarov POMI, Investigations in topology. Part 12, Tome 352 (2008), pp. 120-129. http://geodesic.mathdoc.fr/item/ZNSL_2008_352_a4/
[1] V. G. Olifer, N. A. Olifer, Kompyuternye seti. Printsipy, tekhnologii, protokoly, Piter, SPb, 2001, 356 pp.
[2] I. V. Kotenko, M. V. Stepashkin, V. S. Bogdanov, “Arkhitektury i modeli komponentov aktivnogo analiza zaschischennosti na osnove imitatsii deistvii zloumyshlennikov”, Problemy informatsionnoi bezopasnosti. Kompyuternye sistemy, 2005, 65
[3] V. I. Vorobev, E. P. Rumyantseva, R. R. Fatkieva, “Otsenka effektivnosti investitsii v informatsionuyu bezopasnost obrazovatelnykh tekhnologii”, Trudy RGPU, SPb, 2007, 47
[4] G. G. Malinetskii, A. B. Potapov, A. V. Podlazov, Nelineinaya dinamika. Podkhody, rezultaty, nadezhdy, URSS, 2006, 279 pp.
[5] G. G. Malinetskii, A. B. Potapov, Nelineinaya dinamika i khaos (Osnovnye ponyatiya), URSS, 2006, 275 pp.
[6] J. Mirkovic, J. Martin, P. Reither, A Taxonomy of Ddos Attacks and Ddos Defence Mechanisms, Technical Report 020018, Computer Science Department, University of California, Los Angeles, 8 pp.
[7] M. Boda, A. Veres, The Chaotic Nature of TCP Congestion Control. Traffic Analysis and Network Performance Laboratory, Budapest 2001, 7 pp.
[8] W. Ditto, T. Mukanata, “Principles and Applications fo Chaotic Systems”, Comm. of the ACM (1995, November), 12–24