A MARKOV MODEL OF NON-MUTUALLY EXCLUSIVE CYBER THREATS AND ITS APPLICATIONS FOR SELECTING AN OPTIMAL SET OF INFORMATION SECURITY REMEDIES

A Markov Model of Non-Mutually Exclusive Cyber Threats and its Applications for Selecting an Optimal Set of Information Security Remedies

In this work, we study a Markov model of cyber threats that act on a computer system.Within the framework of the model the computer system is considered as a system with failures and recoveries by analogy with models of reliability theory.To estimate functionally-temporal properties of the system we introduce a parameter called the lifetime of the

read more

Interaksi antara Proyektil dan Komposit Polimer diperkuat Butiran Silikon Karbid (SiCp) dan Serat Karbon pada Pengujian Balistik

With increasing the security treat and terrorisms that involving the use of firearm and to optimize the security thenmaximum protection for he safety of the security guards, armies, and polices should be put in consideration.In order toconduct their duties properly and to protect their safety, the security guard should beaker creatures series 1 be

read more