Method of Fault Tolerance Evaluation in Conditions of Destabilizing Factors Influence in Infocommunication Network
暂无分享,去创建一个
Batoul Sleiman | Maryna Yevdokymenko | Serhii Harkusha | Olena Harkusha | M. Yevdokymenko | Batoul Sleiman | Serhii Harkusha | O. Harkusha
[1] Man Young Rhee,et al. Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .
[2] Tamara Radivilova,et al. Provision security in SDN/NFV , 2018, 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET).
[3] Kishor S. Trivedi,et al. Ultrahigh Reliability Prediction for Fault-Tolerant Computer Systems , 1983, IEEE Transactions on Computers.
[4] Sonia Fahmy,et al. Analysis of vulnerabilities in Internet firewalls , 2003, Comput. Secur..
[5] William Stallings Zhu,et al. Network Security Essentials : Applications and Standards , 2007 .
[6] George Cybenko. Metrics Based on the System Performance Perspective , 2019 .
[7] Michel Bruneau,et al. Framework for analytical quantification of disaster resilience , 2010 .
[8] David Eppstein,et al. Finding the k shortest paths , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[9] Mohammad Modarres,et al. Reliability engineering and risk analysis : a practical guide , 2016 .
[10] Igor Linkov,et al. Operational resilience: concepts, design and analysis , 2015, Scientific Reports.
[11] A. N. Nazarov. LOGICAL-AND-PROBABILISTIC MODELS FOR ESTIMATING THE LEVEL OF INFORMATION SECURITY OF MODERN INFORMATION AND COMMUNICATION NETWORKS , 2010 .
[12] Yeu-Pong Lai,et al. Using the vulnerability information of computer systems to improve the network security , 2007, Comput. Commun..
[13] Benedek Nagy,et al. Generalized game trees and their evaluation , 2014, 2014 5th IEEE Conference on Cognitive Infocommunications (CogInfoCom).
[14] A. N. Kopylev,et al. Modelling of multiservice streams at the decision of tasks of parametric synthesis , 2013, 2013 23rd International Crimean Conference "Microwave & Telecommunication Technology".
[15] Chen Feng,et al. A Flexible Approach to Measuring Network Security Using Attack Graphs , 2008, 2008 International Symposium on Electronic Commerce and Security.
[16] Yu Liu,et al. Successive survivable routing for node failures , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[17] A. Dmytro,et al. Multiservice telecommunication systems design with network's incoming self-similarity flow , 2008, 2008 International Conference on "Modern Problems of Radio Engineering, Telecommunications and Computer Science" (TCSET).
[18] Mark L. Ayers,et al. Telecommunications System Reliability Engineering, Theory, and Practice , 2012 .