.


:




:

































 

 

 

 





. :

1. . , , , .

2. . ( ), . .

3. . , , , . . .

4. . , .

, . , , . . .

. , , . :

1. . .

2. . , .

3. . , .

4. . , .

5. . . .

6. . , .

. , .

. . , , .

, . .

1. .. . .// , 2,3, 2004.

2. .. , .. . .// .

3. . , . . , . // , 2004.

References

1. I.V. Kotenko. Multi-agent technologies of the analysis vulnerability // Safety of computer systems, 2, 2004, 3, 2004.

2. V.Yu. Kolevatov, Ye.V. Kotelnikov Artificial intelligence methods in problems of safety computer networks // Vyatka state university.

3. James F. Kurose, Keith W. Ross. Computer Networking, a top-down approach featuring the internet. Second edition. Piter, 2004.

 

 





:


: 2016-10-27; !; : 499 |


:

:

, - , ; , - .
==> ...

1577 - | 1579 -


© 2015-2024 lektsii.org - -

: 0.011 .