Department of Economic Cybernetics, Lugansk National Agrarian University, Town LNAU, Lugansk, 91000, Ukraine
Bibliografia
1. Ahmad D., Dubrovskiy A., Flinn Х., 2005.: Defense from the hackers of corporate networks. Trudged. with angl. – 2th izd. M.: Companies AyTi, DMK - Press. 864. (in Russian).
2. Atighetchi M., Pal P., Webber F., Schantz R., Jones C., Loyall J., 2004.: Adaptive Cyberdefense for Survival and Intrusion Tolerance // Internet Computing. Vol. 8, No.6. – 25-33.
3. Atighetchi M., Pal P.P., Jones C.C., Rubel P., Schantz R.E., Loyall J.P., Zinky J.A., 2003.: Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience // Proceedings of 3rd International Workshop Distributed Auto-adaptive and Reconfigurable Systems (DARES). Providence, Rhode Island, USA. 74-84.
4. Chapman C., Ward S., 2003.: Project Risk Management: processes, techniques and insights. Chichester, John Wiley. Vol. 1210.
5. Chertov R., Fahmy S., Shroff N., 2006.: Emulation versus simulation: A case study of TCP-targeted denial of service attacks. In Proc. of the 2nd International сonference on Testbeds and Research Infrastructures for the Development of Networks and Communities.
6. Chi S., Park J., Jung K., Lee J., 2001.: Network Security Modeling and Cyber At-tack Simulation Methodology//LNCS. Vol. 2119.
7. Goldman R., 2002.: A Stochastic Model for Intrusions//LNCS. Vol. 2516.
8. Gorodetski V., Kotenko I., 2002.: Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool. RAID 2000//LNCS. Vol. 2516.
9. Harel D. Statecharts: A., 1987.: Visual Formalism for Complex Systems, Science of Computer Programming.
10. Hariri S., Qu G., Dharmagadda T., Ramkishore M., Raghavendra C., 2003.: Impact Analysis of Faults and Attacks in Large-Scale Networks//IEEE Security & Privacy. 456-459.
11. Hatley D., Pirbhai I., 1988.: Strategies for Real- Time System Specification, Dorset House Publishing Co., Inc., NY.
12. Keromytis A., Parekh J., Gross P., Kaiser G., Misra V., Nieh J., Rubensteiny D., Stolfo S., 2003.: A Holistic Approach to Service Survivability // Proceedings of ACM Workshop on Survivable and Self-Regenerative Systems. Fairfax, VA. 11-22.
13. Larson D.R., Field W.E., Farahmand F., Jeffries J.L., 2006.: Foundations in Homeland Security Studies. Purdue University.
14. Larson D.R., Field W.E., F. Farahmand, Aaltonen P.M., 2007.: Managing Resources and Applications for Homeland Security. Purdue University.
15. Lufar V., 2012.: Database of hazardous substances properties. TEKA Commission of Motorization and Power Industry in Agriculture, V. XII, No. 3, 90-93.
16. Marcus K., Mcquade S. 2011.: Internet Addiction and Online Gaming (Cybersafety). Chelsea House Pub.
17. Marcus K., Mcquade S. 2011.: Living With the Internet (Cybersafety). Chelsea House Pub.
18. McNab C., 2004.: Network Security Assessment. O’Reilly Media, Inc.
19. Mirkovic J., Dietrich S., Dittrich D., Reiher P., 2004.: Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall PTR, 400.
20. Moitra S. D., Konda S. L., 2000.: A Simulation Model for Managing Survivability of Net-worked Information Systems, Technical Report CMU/SEI- 2000-TR-020.
21. Negoita M., Neagu D., Palade V., 2005.: Computational Intelligence Engineering of Hybrid Systems. Springer Verlag. 213.
22. Piszcz A., Orlans N., Eyler-Walker Z., Moore D., 2001.: Engineering Issues for an Adaptive Defense Network. MITRE Technical Report.
23. Rohse M., 2003.: Vulnerability naming schemes and description languages: CVE, Bugtraq, AVDL and VulnXML. SANS GSEC PRACTICAL.
24. Smirniy M., Lahno V., Petrov A., 2009.: The research of the conflict request threads in the data protection systems. Proceedings of Lugansk branch of the International Academy of Informatization. № 2(20). V 2. 2009. – 23-30.
25. Shun-Chieh Lin & Shian-Shyong Tseng. 2004.: Constructing detection knowledge for DDoS intrusion tolerance // Expert Systems with Applications. – 2004. – Vol. 27. – 379-390
26. Templeton S., Levitt K., 2000.: A Requires/Provides Model for Computer Attacks. Proc. of the New Security Paradigms Workshop. 274-280.
27. Xiang Y., Zhou W., Chowdhury M., 2004.: A Survey of Active and Passive Defence Mechanisms against DDoS Attacks. Technical Report, TR C04/02, School of Information Technology, Deakin University, Australia. 38-43.
28. Slobodyanuk M., Nechaev G., 2010.: The evaluation technique of logistics system cargo ransportation efficiency development.TEKA Kom. Mot I Energ. Roln. – OL PAN, 10B. Lublin, 162- 170.
29. Urgen M.W. Pan and S. Stolfo., 2002.: Ensemble-based adaptive intrusion detection. In Proceeding of 2002 SIAM International Conference on Data Mining, Arlington, VA.
30. White D., Alijani G., 2003.: Identifying requirements for network security software. SAM ’03. International Conference, 539-543.
31. Zou C.C., Duffield N., Towsley D., Gong W., 2006.: Adaptive Defense against Various Network Attacks // IEEE Journal on Selected Areas in Communications: High-Speed Network Security (J-SAC). Vol.24, №.10. – 44 -51.