Objectives. At present, conducting a computational experiment on a system for protecting information from unauthorized access operated in an automated system is a time consuming process. The greatest difficulty in this area of research is the determination of probabilistic-temporal characteristics and the formation of reports during the operation of the information protection system. In order to analyze, obtain and study the probabilistic-time characteristics of this system, it is necessary to develop a mathematical model of its operation using an imitational modeling tool.Method. One of the methods for solving this problem is a computational experiment, which is based on the construction of a simulation model. The CPN Tools environment was...
The paper deals with the processing of information about the state of a computer system using a prob...
Aim. One of the key objectives of the theory and practice of information security is to analyse the ...
The article is devoted to issues of development of the informational complex for simulation of funct...
The article is devoted to the method of experimental estimation of parameters of functioning of stan...
Abstract. Aim Currently, the implementation of computational experiments to determine the probabilis...
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models...
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models...
Objective. The most important task of the theory and practice of ensuring the information security o...
This article considers the problem of illegal entry into a certain information system and, in additi...
The widespread use of machine learning, including at critical information infrastructure facilities,...
The paper proposes a new method of conducting an experiment to assess the dynamics of the informatio...
Software protection is an essential aspect of information security to withstand malicious activities...
Objectives Traditional methods for solving the problem of protecting the information resource of ele...
The constuction principles have been developed, and the complex of the protected speed data processi...
This paper describes a realistic intrusion experiment intended to investigate whether such experimen...
The paper deals with the processing of information about the state of a computer system using a prob...
Aim. One of the key objectives of the theory and practice of information security is to analyse the ...
The article is devoted to issues of development of the informational complex for simulation of funct...
The article is devoted to the method of experimental estimation of parameters of functioning of stan...
Abstract. Aim Currently, the implementation of computational experiments to determine the probabilis...
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models...
This paper reports an analysis of the software (SW) safety testing techniques, as well as the models...
Objective. The most important task of the theory and practice of ensuring the information security o...
This article considers the problem of illegal entry into a certain information system and, in additi...
The widespread use of machine learning, including at critical information infrastructure facilities,...
The paper proposes a new method of conducting an experiment to assess the dynamics of the informatio...
Software protection is an essential aspect of information security to withstand malicious activities...
Objectives Traditional methods for solving the problem of protecting the information resource of ele...
The constuction principles have been developed, and the complex of the protected speed data processi...
This paper describes a realistic intrusion experiment intended to investigate whether such experimen...
The paper deals with the processing of information about the state of a computer system using a prob...
Aim. One of the key objectives of the theory and practice of information security is to analyse the ...
The article is devoted to issues of development of the informational complex for simulation of funct...