Abstract
Approaches to recognition of malicious behavior in computer networks and security evaluation of information systems using attributive metagraphs have been considered. Matrices of techniques, tactics, and methods of computer attacks for their simulation have been suggested.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have