Information Technology Reference
In-Depth Information
Fig. 4. Changes of Parameters under Realization of Intention IS
Fig. 5. Changes of Parameters under Realization of Intention GAR (1)
Fig. 6. Changes of Parameters under Realization of Intention GAR (2)
7
Conclusion
In the paper we described the approach to active vulnerability assessment of computer
networks based on modeling and simulation of attacks and its implementation. The
main peculiarities of the approach are (1) malefactor's intention-centric and target-
Search WWH ::




Custom Search