Standard

The problem of resource allocation between the protection system and constructing redundant components. / Bure, V.M.; Karelin, V.V.; Polyakova, L.N.

в: Applied Mathematical Sciences, Том 9, № 96, 2015, стр. 4771-4779.

Результаты исследований: Научные публикации в периодических изданияхстатьяРецензирование

Harvard

APA

Vancouver

Author

BibTeX

@article{0c6660f8cda2422bb77e11c3db4ce352,
title = "The problem of resource allocation between the protection system and constructing redundant components",
abstract = "Recently papers investigating problems on detection of the moment of occurrence of an attack on various systems were published. In particular, they consider {"}Dos-attacks{"} or attacks like of {"}denial of service{"} in a computing system and subsequent changes of the protocol of processing of input assignments. These studies are actual now. The main difference between the paper and previous works is in selection of another formula for setting the probability of a system destruction as a result of the attack. Another major difference from previous work is the use of beta distribution instead a truncated normal distribution for specifying distribution of a random moment of occurrence of attacks.",
keywords = "Beta Distribution, Probability of System Destruction, Resource Allocation",
author = "V.M. Bure and V.V. Karelin and L.N. Polyakova",
year = "2015",
doi = "10.12988/ams.2015.56436",
language = "English",
volume = "9",
pages = "4771--4779",
journal = "Applied Mathematical Sciences",
issn = "1312-885X",
publisher = "Hikari Ltd.",
number = "96",

}

RIS

TY - JOUR

T1 - The problem of resource allocation between the protection system and constructing redundant components

AU - Bure, V.M.

AU - Karelin, V.V.

AU - Polyakova, L.N.

PY - 2015

Y1 - 2015

N2 - Recently papers investigating problems on detection of the moment of occurrence of an attack on various systems were published. In particular, they consider "Dos-attacks" or attacks like of "denial of service" in a computing system and subsequent changes of the protocol of processing of input assignments. These studies are actual now. The main difference between the paper and previous works is in selection of another formula for setting the probability of a system destruction as a result of the attack. Another major difference from previous work is the use of beta distribution instead a truncated normal distribution for specifying distribution of a random moment of occurrence of attacks.

AB - Recently papers investigating problems on detection of the moment of occurrence of an attack on various systems were published. In particular, they consider "Dos-attacks" or attacks like of "denial of service" in a computing system and subsequent changes of the protocol of processing of input assignments. These studies are actual now. The main difference between the paper and previous works is in selection of another formula for setting the probability of a system destruction as a result of the attack. Another major difference from previous work is the use of beta distribution instead a truncated normal distribution for specifying distribution of a random moment of occurrence of attacks.

KW - Beta Distribution

KW - Probability of System Destruction

KW - Resource Allocation

U2 - 10.12988/ams.2015.56436

DO - 10.12988/ams.2015.56436

M3 - Article

VL - 9

SP - 4771

EP - 4779

JO - Applied Mathematical Sciences

JF - Applied Mathematical Sciences

SN - 1312-885X

IS - 96

ER -

ID: 3952625