. :
1. . , , , .
2. . ( ), . .
3. . , , , . . .
4. . , .
, . , , . . .
. , , . :
1. . .
2. . , .
3. . , .
4. . , .
5. . . .
6. . , .
. , .
. . , , .
|
|
, . .
1. .. . .// , 2,3, 2004.
2. .. , .. . .// .
3. . , . . , . // , 2004.
References
1. I.V. Kotenko. Multi-agent technologies of the analysis vulnerability // Safety of computer systems, 2, 2004, 3, 2004.
2. V.Yu. Kolevatov, Ye.V. Kotelnikov Artificial intelligence methods in problems of safety computer networks // Vyatka state university.
3. James F. Kurose, Keith W. Ross. Computer Networking, a top-down approach featuring the internet. Second edition. Piter, 2004.