GERT Models of Technology of Cloudy Anti-Virus Defense
Journal: Cybersecurity: Education, Science, Technique (Vol.2, No. 2)Publication Date: 2019-03-03
Authors : Oleksii A. Smirnov Serhii A. Smirnov Liudmyla I. Polishchuk Oksana K. Konoplitska-Slobodeniuk Tetyana V. Smirnova;
Page : 6-30
Keywords : telecommunication systems; anti-virus defence; treatment of metadatas; anti-virus nephystems;
Abstract
The complex of the mathematical GERT- models of technology of cloudy anti-virus defence of the telecommunication system (TCS) is worked out in this article, that allowed to get analytical expressions for timing of transmission of files of metadatas and forming and delivery of commands of control transfer. A mathematical model is worked out and a study of probabilistic-temporal descriptions of algorithms and programs of forming and treatment of metadatas is undertaken in anti-virus nephystems. Her distinctive feature is an account of necessity of forming of commands of control transfer to the programmatic client of TCS. On the second stage of design GERT- of model of technology of forming and treatment of metadatas is worked out in cloudy anti-virus nephystems. The feature of these models is an account of row of technological features of TCS (heterogeneity, much connectedness, possibility of breaking up of file of metadatas and commands of control transfer on the shots of and other). Use of the worked out GERT- models of technology of transmission of files of metadatas, and also treatments and deliveries of commands of control transfer and account in her possibilities of breaking up of file of metadatas and commands of control transfer on shots allowed to 1,2 time to promote exactness at the estimation of temporal description, and to 1,4 times at the estimation of jitter time of transmission and treatment of files of metadatas and commands of control transfer. The results of estimation of exactness of design results confirmed the fact of expediency of the use of the worked out GERT- model of technology of transmission hash - file of metadatas and commands of control at planning of the systems of anti-virus defence transfer modern TCS.
Other Latest Articles
- Calculation of Parameters of Cryptic Curves Edwards over the Fields of 5th and 7th Characteristic
- Audit of Information Security is the basis of Effective Protection of the Enterprise
- Methodological Aspects of the Internet of Things Disciplines Study
- Mathematical Model of Information Security’s Threat Agent
- Informative Safety of Unmanned Aviation Systems Radio Communication Channel
Last modified: 2019-03-03 20:52:49