Потокові моделі мережі Інтернет за умов атак на відмову
This paper deals with fluid controlled models of networks under flooding denial of service attacks. We proposed a new approach to analyzing network work using fluid models and conflict control theory domain. Using analytic model there is found solution for certain class of networks and Nash equilibr...
Saved in:
| Date: | 2015 |
|---|---|
| Main Authors: | Andon, P.I., Ignatenko, O.P. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2015
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/102 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Потокові моделі мережі Інтернет за умов атак на відмову
by: Андон, П.І., et al.
Published: (2012)
by: Андон, П.І., et al.
Published: (2012)
Conflict controlled network modeling: evolutionary games approach
by: Ignatenko, O.P., et al.
Published: (2019)
by: Ignatenko, O.P., et al.
Published: (2019)
Game model of user interaction in heterogeneous distributed environments
by: Ignatenko, O.P., et al.
Published: (2017)
by: Ignatenko, O.P., et al.
Published: (2017)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Fluid models of dynamic scheduling in computer networks
by: Іgnatenko, O.P.
Published: (2025)
by: Іgnatenko, O.P.
Published: (2025)
Implementation the concept of adaptive broadcast system and automatic preparation of content
by: Provotar, O.I., et al.
Published: (2025)
by: Provotar, O.I., et al.
Published: (2025)
Control models of data flows in Internet under instability
by: Ignatenko, O.P.
Published: (2025)
by: Ignatenko, O.P.
Published: (2025)
Game-theory analysis of multi-processor schedulers. Simulation model
by: Ignatenko, O.P., et al.
Published: (2018)
by: Ignatenko, O.P., et al.
Published: (2018)
Game theoretic modeling of AIMD network equilibrium
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Evolutionary games in TCP networks with speed restriction policies
by: Ignatenko, O.P., et al.
Published: (2018)
by: Ignatenko, O.P., et al.
Published: (2018)
Протидія атакам на відмову в мережі інтернет: концепція підходу
by: Андон, П.І., et al.
Published: (2008)
by: Андон, П.І., et al.
Published: (2008)
V.M. Glushkov Kyiv School of Programming
by: Andon, P.I.
Published: (2025)
by: Andon, P.I.
Published: (2025)
Алгебраїчні атаки на потокові шифратори як узагальнення кореляційних атак
by: Пометун, С.О.
Published: (2008)
by: Пометун, С.О.
Published: (2008)
Алгебраїчні атаки на потокові шифратори як узагальнення кореляційних атак
by: Pometun, S. O.
Published: (2017)
by: Pometun, S. O.
Published: (2017)
Моделі керування потоками даних мережі інтернет за умов нестабільної поведінки
by: Ігнатенко, О.П.
Published: (2011)
by: Ігнатенко, О.П.
Published: (2011)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Challenges and opportunities in the programming environment SEMANTIC WEB
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Потокові моделі динамічного планування черг в комп’ютерних мережах умов конфлікту
by: Ігнатенко, О.П.
Published: (2010)
by: Ігнатенко, О.П.
Published: (2010)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Multi-threaded computer calculations in the considered nonlinear dynamic systems
by: Lazarenko, S.V., et al.
Published: (2025)
by: Lazarenko, S.V., et al.
Published: (2025)
Deductive verification of requirements for event-driven architecture
by: Letichevsky, A.A., et al.
Published: (2025)
by: Letichevsky, A.A., et al.
Published: (2025)
Managing scientific workflows in grid systems
by: Tverdokhlib, E.M., et al.
Published: (2025)
by: Tverdokhlib, E.M., et al.
Published: (2025)
Analysis of the computational resources of personal computers
by: Lopatkin, R.Yu., et al.
Published: (2017)
by: Lopatkin, R.Yu., et al.
Published: (2017)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Security basic model for applied tasks of the distributed information system
by: Rodin, Y.S., et al.
Published: (2021)
by: Rodin, Y.S., et al.
Published: (2021)
Зброєзнавство: каталог фахових ресурсів мережі Інтернет
by: Тоїчкін, Д.
Published: (2013)
by: Тоїчкін, Д.
Published: (2013)
Machine learning methods analysis in the document classification problem
by: Zhyrkova, A.P., et al.
Published: (2021)
by: Zhyrkova, A.P., et al.
Published: (2021)
Information Technology for Computer Systems Applied Software Development and Usage Cost expert-analytical estimation
by: Andon, P.I., et al.
Published: (2019)
by: Andon, P.I., et al.
Published: (2019)
АСИНХРОННІ ПОТОКОВІ ОБРОБКИ ОПТИЧНОЇ ІНФОРМАЦІЇ
by: Натрошвили, О. Г., et al.
Published: (2021)
by: Натрошвили, О. Г., et al.
Published: (2021)
Сучасна комунікація: особливості мовлення в мережі інтернет
by: Карпушина, М., et al.
Published: (2016)
by: Карпушина, М., et al.
Published: (2016)
Видимість наукової періодики України в мережі Інтернет
by: Костенко, Л.Й.
Published: (2013)
by: Костенко, Л.Й.
Published: (2013)
Зброєзнавство: фахові ресурси мережі Інтернет. Частина 2
by: Тоїчкін, Д.
Published: (2015)
by: Тоїчкін, Д.
Published: (2015)
Fundamentals for Cost Estimating of Applied Software Development and Modification
by: Andon, P.I., et al.
Published: (2018)
by: Andon, P.I., et al.
Published: (2018)
Software architectural design for the interactive learning of sign language
by: Kryvonos, Yu.G., et al.
Published: (2025)
by: Kryvonos, Yu.G., et al.
Published: (2025)
An intellectual information technology for organizational decisions expert-analytical support
by: Ilyina, O.P., et al.
Published: (2025)
by: Ilyina, O.P., et al.
Published: (2025)
Інтеграція даних у мережі Інтернет: зв’язані дані
by: Новицький, О.В.
Published: (2010)
by: Новицький, О.В.
Published: (2010)
Технологія оптимізованої передачі жестової мови в мережі Інтернет
by: Крак, Ю.В., et al.
Published: (2009)
by: Крак, Ю.В., et al.
Published: (2009)
Виявлення та протидія інформаційним атакам з мережі Інтернет
by: Зубок, В.Ю.
Published: (2009)
by: Зубок, В.Ю.
Published: (2009)
Архітектура інтелектуальної системи інформаційного пошуку в мережі Інтернет
by: Досин, Д.Г., et al.
Published: (2012)
by: Досин, Д.Г., et al.
Published: (2012)
Similar Items
-
Потокові моделі мережі Інтернет за умов атак на відмову
by: Андон, П.І., et al.
Published: (2012) -
Conflict controlled network modeling: evolutionary games approach
by: Ignatenko, O.P., et al.
Published: (2019) -
Game model of user interaction in heterogeneous distributed environments
by: Ignatenko, O.P., et al.
Published: (2017) -
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018) -
Fluid models of dynamic scheduling in computer networks
by: Іgnatenko, O.P.
Published: (2025)