THE OPTIMAL CONTROL IN THE MODELOF NETWORK SECURITY FROM MALICIOUS CODE
Abstract
References
1. Leveille J. Epidemic spreading in technological networks. Technical Report HPL-2002-287, HP Laboratories Bristol, October 2002. URL: http://www.hpl.hp.com/techreports/2002/HPL-2002- 287.pdf
2. Voroncov V.V., Kotenko I.V. Analiticheskie modeli rasprostraneniya setevyh chervej. Trudy SPIIRAN. Issue 4. SPb.: Nauka. 2007. Pp. 208–224.
3. Evtushenko Yu.G. Metody resheniya ehkstremal'nyh zadach i ih primenenie v sistemah optimizacii. Moscow: Nauka. 1982. 432 p.
4. Andreeva E.A., Ciruleva V.M. Variacionnoe ischislenie i metody optimizacii. M.: Vysshaja shkola. 2006. 584 p.
5. Kamke E. Spravochnik po obyknovennym differencial'nym uravnenijam. Moscow: Nauka. Gl. red. fiz-mat. lit. 1988. 584 p. 6. Vasil'ev F.P. Chislennye metody reshenija jekstremal'nyh zadach. Moscow: Nauka. Gl. red. fiz-mat. lit. 1988. 552 p.
Review
For citations:
Semykina N.F. THE OPTIMAL CONTROL IN THE MODELOF NETWORK SECURITY FROM MALICIOUS CODE. Civil Aviation High Technologies. 2016;(224):132-137. (In Russ.)