Search Results - probabilistic technical modeling/modelling

Search alternatives:

  • Showing 1 - 1 results of 1
Refine Results
  1. 1

    MODEL OF THE PROCESS OF FUNCTIONING OF THE INFORMATION PROTECTION SYSTEM FROM UNAUTHORIZED ACCESS CREATED IN THE SOFTWARE ENVIRONMENT OF IMITATION MODELING "CPN TOOLS" by O. I. Bokova, I. G. Drovnikov, A. D. Popov, E. A. Rogozin

    Published 2019-07-01
    “…The greatest difficulty in this area of research is the determination of probabilistic-temporal characteristics and the formation of reports during the operation of the information protection system. …”
    Get full text
    Article