The article discusses the mathematical model of the implemented intruder of the process of information impact on the operational-technological communication network based on IP technologies, representing the process of functioning of the IP telephone network in the form of a stochastic network, using the Mason equation for closed graphs, an equivalent function of the stochastic network, the network functioning process operational-technological communication-IP in the conditions of the nth type of cyber attack of the intruder. To demonstrate the method for determining the distribution function of time for bringing data packets in the operational-technological communication-IP network, a particular problem is considered. Using the Mason equat...
A new model for intrusion and its propagation through various attack schemes in networks is consider...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
[[abstract]]The real-world networks are large and complex entities and there are many studies on mat...
Cyberattacks against the elements of technological data transmission networks represent a rather sig...
In this PhD Thesis we developed models for the abnormal network traffic based on TCP/IP communicatio...
In this article, using the mathematical modeling of the operation process of the radio communication...
Objective. The most important task of the theory and practice of ensuring the information security o...
The necessity of developing a mathematical model for the functioning of adaptive routing protocols i...
The heterogeneous computer networks the regional sub-networks of wich consist of the nodes the funct...
We propose a new mathematical model of virus spreading over local area networks. We define a cost f...
The new approach to the analysis of the significance in parameters and also the conceptual model of ...
The wireless self-organizing network under attack was considered. The aim was to organize “a ...
Abstract: In this paper, we propose a model for predicting the dynamics of a generalized efficiency ...
Abstract: The attack actions analysis for Ad Hoc networks can provide a reference for the design sec...
Abstract: Problems of multiservice network modeling on the basis of hybrid methods – methods of grap...
A new model for intrusion and its propagation through various attack schemes in networks is consider...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
[[abstract]]The real-world networks are large and complex entities and there are many studies on mat...
Cyberattacks against the elements of technological data transmission networks represent a rather sig...
In this PhD Thesis we developed models for the abnormal network traffic based on TCP/IP communicatio...
In this article, using the mathematical modeling of the operation process of the radio communication...
Objective. The most important task of the theory and practice of ensuring the information security o...
The necessity of developing a mathematical model for the functioning of adaptive routing protocols i...
The heterogeneous computer networks the regional sub-networks of wich consist of the nodes the funct...
We propose a new mathematical model of virus spreading over local area networks. We define a cost f...
The new approach to the analysis of the significance in parameters and also the conceptual model of ...
The wireless self-organizing network under attack was considered. The aim was to organize “a ...
Abstract: In this paper, we propose a model for predicting the dynamics of a generalized efficiency ...
Abstract: The attack actions analysis for Ad Hoc networks can provide a reference for the design sec...
Abstract: Problems of multiservice network modeling on the basis of hybrid methods – methods of grap...
A new model for intrusion and its propagation through various attack schemes in networks is consider...
Development of Cybersecurity processes and strategies should take two main approaches. One is to dev...
[[abstract]]The real-world networks are large and complex entities and there are many studies on mat...