Abstract

An understanding of how well networks will respond to ongoing attack threats is an important task in formulating strategies to protect unauthorized network activities. The study of topological properties of network architecture sheds some light in this effort. The purpose of this paper is to study several scenarios that address topological structures and related analyses of network systems to begin the appropriate discussion towards this question. Analysis of the probabilistic state finite automation and its probability distribution theory play a pivotal role in the discussion.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.