2022
DOI: 10.15587/1729-4061.2022.253530
|View full text |Cite
|
Sign up to set email alerts
|

Development of a method for checking vulnerabilities of a corporate network using Bernstein transformations

Abstract: One of the leading areas of cybersecurity of communication networks is considered – the introduction of preventive mechanisms, among which the most promising are the methods of active security analysis. These methods allow, in addition to timely detection of vulnerabilities of the target system (analyzed system), to confirm the possibility of their implementation, that is, to validate vulnerabilities by simulating the real actions of a potential attacker. The urgent need to validate vulnerabilities out of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 19 publications
(27 reference statements)
0
4
0
2
Order By: Relevance
“…Separately, the group of PRNG based on elliptic curves should be noted. Several PRNG algorithms based on the properties of elliptic curves have been proposed [11]. As a rule, the implementation of such PRNG is based on the use of already known algorithms for a group of points on an elliptic curve.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Separately, the group of PRNG based on elliptic curves should be noted. Several PRNG algorithms based on the properties of elliptic curves have been proposed [11]. As a rule, the implementation of such PRNG is based on the use of already known algorithms for a group of points on an elliptic curve.…”
Section: Methodsmentioning
confidence: 99%
“…The work [11] considers hardware information protection in the form of a built-in computer board. They are special devices that are installed in a computer in order to protect the information processed on it.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Уважається, що оптимальна за чисельністю група експертів становитиме 10-15 осіб. У цьому разі ймовірність істинності колективного експертного висновку 13 дорівнює приблизно 0,8. 13 .…”
Section: виникнення передумов проблемиunclassified
“…У цьому разі ймовірність істинності колективного експертного висновку 13 дорівнює приблизно 0,8. 13 .…”
Section: виникнення передумов проблемиunclassified
“…In this theory, stability can be estimated without solving the system of differential equations which describing the object, and, using simple signs, conditions and stability criteria, developed by Vyshnegradsky I. O., Gurvits A., Mikhailov A. V., Nyquist H. and others. By the analogy with the classical theory of stability, it is proposed to evaluate the functional stability of the parameters of the graph describing the structure of the wireless sensor network [12,17]. It turns out that the appearance of the graph and its parameters can be determined: whether the network is functionally stable, unstable or neutral.…”
Section: Presenting Main Materialsmentioning
confidence: 99%