-
1
Modelling and Simulation of Unreliable e2/e2/1/m Queueing System
Published 2011-06-01Subjects: Get full text
Article -
2
OPTIMIZATION OF TOLL SERVICES USING QUEUING THEORY IN THE CASE OF ETHIOPIA
Published 2022-12-01Subjects: Get full text
Article -
3
МОДЕЛЬ АВТОМАТИЗОВАНОЇ СИСТЕМИ ОПРАЦЮВАННЯ ПАРАМЕТРІВ ПАСАЖИРОПОТОКУ ГРОМАДСЬКОГО ТРАНСПОРТУ "РОЗУМНОГО" МІСТА НА ОСНОВІ КОЛЬОРОВИХ МЕРЕЖ ПЕТРІ...
Published 2017-11-01Subjects: Get full text
Article -
4
Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things
Published 2022-09-01Subjects: Get full text
Article -
5
Prosega/CPN: An Extension of CPN Tools for Automata-based Analysis and System Verification
Published 2018-10-01Subjects: Get full text
Article -
6
DEVELOPMENT OF A MATHEMATICAL MODEL OF THE PROCESSES OF INCIDENT MANAGEMENT COMMUNICATIONS SERVICES
Published 2022-05-01Subjects: Get full text
Article -
7
Cyber Attack Simulation for Operational Security Evaluation Using Coloured Petri Nets
Published 2012-09-01Subjects: Get full text
Article -
8
Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool
Published 2024-02-01Subjects: “…CPN tools…”
Get full text
Article -
9
VERIFICATION OF KEY MANAGEMENT CRYPTOGRAPHIC PROTOCOLS WITH COLORED PETRI NETS
Published 2011-11-01Subjects: Get full text
Article -
10
VERIFICATION OF KEY MANAGEMENT CRYPTOGRAPHIC PROTOCOLS WITH COLORED PETRI NETS
Published 2018-07-01Subjects: Get full text
Article -
11
Distributed Management Systems for Infocommunication Networks: A Model Based on TM Forum Frameworx
Published 2019-06-01Subjects: Get full text
Article -
12
Development of an imitation model of information protection system from unauthorized access using the cpn tools software
Published 2019-09-01Subjects: “…CPN Tools, Petri nets, information protection system, unauthorized access, simulation model, automated system, strongly connected components.…”
Get full text
Article -
13
Simulation of the dynamics of network attacks in automated systems of internal affairs bodies in the "CPN Tools" software environment
Published 2021-01-01Subjects: “…information protection system, unauthorized access, network attack, information conflict, petri-markov network, probabilistic-time characteristics, simulation modeling, "cpn tools" software environment.…”
Get full text
Article