WebSite Logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. Automatic Control and Computer Sciences
  2. Automatic Control and Computer Sciences : Volume 49
  3. Automatic Control and Computer Sciences : Volume 49, Issue 8, December 2015
  4. Adaptive reflexivity threat protection
Loading...

Please wait, while we are loading the content...

Automatic Control and Computer Sciences : Volume 51
Automatic Control and Computer Sciences : Volume 50
Automatic Control and Computer Sciences : Volume 49
Automatic Control and Computer Sciences : Volume 49, Issue 8, December 2015
Efficiency comparison of optimum and adaptive methods for multichannel signal filtering
Thermodynamic approach to modeling multi-agent systems in cyberspace
Approach to the construction of the generalized functional-semantic cyber security model
Resolving semantic inconsistencies in elibrary.ru based on fuzzy inference
Using risk-oriented approaches to solve information security problems
Design and verification of protected systems with integrated devices based on expert knowledge
On using the stochastic superindicator for information security evaluation in automated systems
Approach to APCS protection from cyber threats
Automatic security management of computer systems
Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters
Access control method in distributed grid computing networks
Secure processor architecture modeling for large-scale systems
Support of the integrity of administrative information in intensive data exchange with RDBMS clients
Analytical review of methods of providing internet anonymity
Attack tree-based approach for real-time security event processing
Method of security against computer attacks based on an analysis of executable machine code
Multilevel modeling of preemptive scenarios
Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment
Universal national security platform for distributed information and telecommunication systems
Adaptive reflexivity threat protection
Applying correlation analysis methods to control flow violation detection in the internet of things
Model of hidden IT security threats in the cloud computing environment
Methods of protecting self-organizing networks against attacks on traffic routing
Formal model of cyber attacks on virtualization tools and a measure of hypervisor vulnerability
Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster
Using data-mining methods to detect network attacks
Organization of revocation for lattice-based group signature scheme
Using adaptive filtering of signals for estimation of the Mahalanobis distance
Study of countermeasures against covert channels in IP networks
Analysis of broadcast schemes that implement identity-based encryption algorithms
Ideal composite modular secret sharing schemes
User authentication based on the chess graphical password scheme resistant to shoulder surfing
Mechanism of establishing authorship of short messages posted by users of internet portals by methods of mathematical linguistics
Detection of anomalies in behavior of the software with usage of Markov chains
Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols
The use of virtualization technology in the dynamic analysis of software code
Automatic Control and Computer Sciences : Volume 49, Issue 7, December 2015
Automatic Control and Computer Sciences : Volume 49, Issue 6, November 2015
Automatic Control and Computer Sciences : Volume 49, Issue 5, September 2015
Automatic Control and Computer Sciences : Volume 49, Issue 4, July 2015
Automatic Control and Computer Sciences : Volume 49, Issue 3, May 2015
Automatic Control and Computer Sciences : Volume 49, Issue 2, March 2015
Automatic Control and Computer Sciences : Volume 49, Issue 1, January 2015
Automatic Control and Computer Sciences : Volume 48
Automatic Control and Computer Sciences : Volume 47
Automatic Control and Computer Sciences : Volume 46
Automatic Control and Computer Sciences : Volume 45
Automatic Control and Computer Sciences : Volume 44
Automatic Control and Computer Sciences : Volume 43
Automatic Control and Computer Sciences : Volume 42
Automatic Control and Computer Sciences : Volume 41

Similar Documents

...
Abnormal action detection based on Markov models

Article

...
The adaptive “up-and-down” method with a variable step

Article

...
Adaptive methods in discrete stroboscopy

Article

...
Generalized adaptive signature analysis

Article

...
Model checking of distributed systems with affine data structures

Article

...
Distributed embedded control system design with verification support

Article

...
Approach to APCS protection from cyber threats

Article

...
Development of an adaptive routing mechanism in software-defined networks

Article

...
Adaptive technology of the sampling of noise-corrupted signals

Article

Adaptive reflexivity threat protection

Content Provider Springer Nature Link
Author Lavrova, D. S. Pechenkin, A. I.
Copyright Year 2015
Abstract A confrontation between a security administrator and an intruder is presented as a conflict of information security. The formalization of the conflict with the use of Lefebvre’s algebra of conflicts is proposed. The effective behavior policies of the parties to the conflict in terms of protection have been analyzed. An approach to implementing these policies using deceptive systems has been suggested.
Starting Page 727
Ending Page 734
Page Count 8
File Format PDF
ISSN 01464116
Journal Automatic Control and Computer Sciences
Volume Number 49
Issue Number 8
e-ISSN 1558108X
Language English
Publisher Allerton Press
Publisher Date 2016-01-28
Publisher Place New York
Access Restriction One Nation One Subscription (ONOS)
Subject Keyword deceptive system intruder threat model protection mechanisms Lefebvre’s algebra of conflicts Control Structures and Microprogramming
Content Type Text
Resource Type Article
Subject Signal Processing Control and Systems Engineering Software
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
  • Chat with Us
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
I will try my best to help you...
Cite this Content
Loading...