Место издания:Yalta, Crimea: CEUR CEUR WORKSHOP PROCEEDINGS
Первая страница:158
Последняя страница:176
Аннотация:Abstract. Selecting the invariant classification characteristics of the program
behavior of some secured infrastructure (in this task, into two classes: correct
and incorrect execution) is identical to the isomorphism problem of the two systems under some mapping. I order to clarify the necessary and sufficient conditions for the system isomorphism, as well as to determine the isomorphism
mapping qualitative and quantitative parameters, a similarity theory of the
mathematical apparatus was developed. However, in the late 1980s, the results
were applied in the field of modeling, applying the universal digital computers
and then transferred to solve a much wider spectrum of problems, including cybersecurity and ensuring the required cyber resilience of the critical information
infrastructure.