Stochastic Violator Model

dc.contributor.authorKaczynski, Anatoliy
dc.contributor.authorKireienko, Oleksandr
dc.contributor.authorKozlenko, Oleh
dc.date.accessioned2023-05-12T04:46:05Z
dc.date.available2023-05-12T04:46:05Z
dc.date.issued2021
dc.description.abstractThis paper introduces a new type of violator model that is based on Markov chains. It can be used as a scenario model AS IS or as a mathematical model with quantitative estimates if additional information is presented. Our aim with this paper was to develop a model that will allow to restore missing data, using existing knowledge about violator. The results show that presented scenario for general cases cover the majority of attacks and can be applied to real-life scenarios too. Summing up the results, it can be concluded that additional improvement of the model should be focused on data gathering to ensure that existing data will be enough to recover the rest.uk
dc.format.pagerangePp. 42-45uk
dc.identifier.citationKaczynski, A. Stochastic Violator Model / Anatoliy Kaczynski, Oleksandr Kireienko, Oleh Kozlenko // Theoretical and Applied Cybersecurity : scientific journal. – 2021. – Vol. 3, Iss. 1. – Pp. 42–45. – Bibliogr.: 9 ref.uk
dc.identifier.doihttps://doi.org/10.20535/tacs.2664-29132021.1.251308
dc.identifier.urihttps://ela.kpi.ua/handle/123456789/55587
dc.language.isoukuk
dc.publisherIgor Sikorsky Kyiv Polytechnic Instituteuk
dc.publisher.placeKyivuk
dc.relation.ispartofTheoretical and Applied Cybersecurity: scientific journal, Vol. 3, No. 1uk
dc.subjectviolator modeluk
dc.subjectMarkov processesuk
dc.subjectattack scenariosuk
dc.subject.udc004uk
dc.titleStochastic Violator Modeluk
dc.typeArticleuk

Файли

Контейнер файлів
Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
251308-577029-1-10-20220117.pdf
Розмір:
852.26 KB
Формат:
Adobe Portable Document Format
Опис:
Ліцензійна угода
Зараз показуємо 1 - 1 з 1
Ескіз недоступний
Назва:
license.txt
Розмір:
9.1 KB
Формат:
Item-specific license agreed upon to submission
Опис: