[PDF] Software quality standards | Semantic Scholar

This study selected three complex, widely used target applications for which access to their entire development history and source code was available and restricted their selection to GUI-driven software developed on the Java platform to enable cross-application comparison.

This study selected three complex, widely used target applications for which access to their entire development history and source code was available and restricted their selection to GUI-driven software developed on the Java platform to enable cross-application comparison.

Graph models are developed and simulation modeling of dynamics of the implementation of these network attacks in the CPN Tools software environment is carried out, too, and results are presented as the quantitative values of probability-time characteristics of the network attack types under examination.

Graph models are developed and simulation modeling of dynamics of the implementation of these network attacks in the CPN Tools software environment is carried out, too, and results are presented as the quantitative values of probability-time characteristics of the network attack types under examination.

Simulation of the dynamics of network attacks in automated systems of internal affairs bodies in the “CPN Tools” software environment

. The paper presents the results of simulation modeling of the dynamics of the implementation of a network attack in its conflict interaction with the information protection system from unauthorized

  • PDF