RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika // Archive

Prikl. Diskr. Mat., 2008 Number 1(1), Pages 71–87 (Mi pdm13)

This article is cited in 3 papers

Mathematical Foundations of Computer Security

DP-model application for network security analysis

D. N. Kolegov

Tomsk State University

Abstract: The closure of the DP-models is offered. The algorithms of finding closure are described. Application of the models for network security analyses is considered. REM and VTG topological models are formalized in terms of DP-model theory.

UDC: 004.94



© Steklov Math. Inst. of RAS, 2026