PROTECTION AGAINST INVESTIGATION AND APPLICATION IN SECURITY SYSTEMS


Cite item

Full Text

Abstract

Informational interaction of a violator and a protected system in the form of stereotypic investigation schemes is considered. The attack effectiveness decreasing method based on artificial increase of the system diversification is suggested. Security systems design automation problem is described.

References

  1. Эшби, У. Р. Введение в кибернетику / У. Р. Эшби. М. : КомКнига, 2006.
  2. Семенкин, Е. С. Метод обобщенного адаптивного поиска для синтеза систем управления сложными объектами / Е . С. Семенкин, В. А. Лебедев . М. : МАКС Пресс, 2002.

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2009 Semenkin E.S., Styugin M.A.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies