Другие журналы

. A B C D E F G H I J K L M N O P R S T U V W Y Z К М С Т

Vel'c

Game-theoretic approach to risk assessment and vulnerability detection in information networks
Engineering Education # 08, August 2013
DOI: 10.7463/0813.0630132
In this paper a mathematical model based on directed graphs was presented. This model allows one to apply a quantitative approach to risk assessment and vulnerability detection in information networks, which is an important step during the security system design. A utility function and a heuristic for informed memory-bounded search SMA* algorithm were also proposed. These results could be used for security audit and countermeasures planning.
Hierarchical representation of a computer network on the basis of a Hopfield neural network
Engineering Education # 09, September 2013
DOI: 10.7463/0913.0630141
The problem of hierarchical representation of a computer network for carrying out its multiscale analysis was considered. An original problem was reduced to the known set cover problem (SCP). Since this problem is NP-difficult, approximate heuristic techniques were useful for its solving. We proposed an algorithm based on the recurrent Hopfield neural network and its combination with the simulated annealing algorithm (so-called Boltzmann machine). A greedy algorithm was used for a construction of hierarchy levels. This approach was evaluated with a use of the test problems from OR-Library. Proposed approach could be used in the systems of traffic analysis and anomaly detection in computer networks.
 
SEARCH
 
elibrary crossref ulrichsweb neicon rusycon
Photos
 
Events
 
News



Authors
Press-releases
Library
Conferences
About Project
Rambler's Top100
Phone: +7 (915) 336-07-65 (строго: среда; пятница c 11-00 до 17-00)
  RSS
© 2003-2022 «Наука и образование»
Перепечатка материалов журнала без согласования с редакцией запрещена
 Phone: +7 (915) 336-07-65 (строго: среда; пятница c 11-00 до 17-00)