2018
DOI: 10.21778/2413-9599-2018-2-48-57
|View full text |Cite
|
Sign up to set email alerts
|

Model of Vulnerability Identification in Unstable Network Interactions With Automated System

Abstract: 1 Московский государственный технический университет им. Н. Э. Баумана, Москва, Россия, 2 Краснодарское высшее военное училище им. генерала армии С. М. Штеменко, Краснодар, Россия, 3 Московский государственный технический университет им. Н. Э. Баумана, Калужский филиал, Калуга, Россия МОДЕЛЬ ВЫЯВЛЕНИЯ УЯЗВИМОСТЕЙ ПРИ НЕСТАБИЛЬНЫХ СЕТЕВЫХ ВЗАИМОДЕЙСТВИЯХ С АВТОМАТИЗИРОВАННОЙ СИСТЕМОЙ В статье дается описание модели выявления уязвимостей при нестабильных сетевых взаимодействиях с автоматизированной системой. Про… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…Paper [6] proposes a vulnerability detection model based on firmware logic machines. In this case, the authors reduced the task of mathematical modeling to the synthesis of a control firmware machine as part of an adaptive-control module of the system of identifying vulnerabilities in an unstable network environment.…”
Section: The Aim and Objectives Of The Studymentioning
confidence: 99%
See 1 more Smart Citation
“…Paper [6] proposes a vulnerability detection model based on firmware logic machines. In this case, the authors reduced the task of mathematical modeling to the synthesis of a control firmware machine as part of an adaptive-control module of the system of identifying vulnerabilities in an unstable network environment.…”
Section: The Aim and Objectives Of The Studymentioning
confidence: 99%
“…The model given in [6], along with the merits described by its authors (operationality, completeness, accuracy), has obvious flaws caused by the choice of the basic technology of problem-solving:…”
Section: The Aim and Objectives Of The Studymentioning
confidence: 99%
“…Analysis of the literature has shown that at present there are various approaches to mathematical formalization and modeling of software security testing processes. These models are presented in works [1][2][3][4][5][6][7][8][9][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, in [1], a model for identifying vulnerabilities is proposed. The authors of the article based the model on the logic of microprogram machines.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation