Now showing items 1-6 of 6

    • Computer system attack classification 

      Paulauskas, Nerijus; Garšva, Eimantas (Elektronika ir elektrotechnika, 2006)
      The computer system security modeling needs a numerical attack severity evaluation. Some hypothetical attack severity values are usually used. With the aim to make modeling more accurate and to expand the model abilities ...
    • Host scan detection simulation 

      Paulauskas, Nerijus; Garšva, Eimantas (Information systems architecture and technology : information systems and computer communication networks / Wroclaw University of Technology, 2008)
      Port scanning is the phase of intelligence gathering and detected port scan usually means that the attacker is interestd in particular computer system and attempts to breach it. In this work host scan or sometimes called ...
    • Kompiuterių sistemos išliekamumo modeliavimas 

      Garšva, Eimantas (Elektronika ir elektrotechnika, 2006)
      Išliekamumas yra bendra skaitinė sistemos gebėjimo išlikti po atakų charakteristika, padedanti lyginti sistemas ir apsaugos mechanizmus. Modeliuojant sistemos išliekamumą, modeliuojamas incidentų atsiradimo procesas, ...
    • Microwave Office programų paketo taikymo lėtinimo sistemoms tirti patirtis 

      Skudutis, Julius; Daškevičius, Vladislavas; Garšva, Eimantas (Elektronika ir elektrotechnika, 2004)
      Ištirtos paketo Microwave Office taikymo spiralinių lėtinimo sistemų savybėms tirti galimybės. Pateikti įvairių tipų plokščių spiralinių sistemų (SS) modeliai, sukurti naudojant vidinį grafinį Microwave Office redaktorių. ...
    • Survivability modelling with Petri nets 

      Garšva, Eimantas (Известия Белорусской инженерной академии, 2005)
      Computer system security evaluation using survivability characteristic is described. Incident arrival process is a stochastic point Poisson process. The computer system is described using the defense mechanism strength, ...
    • The analysis of threats to academic computer system 

      Paulauskas, Nerijus; Garšva, Eimantas (Инженерный вестник, 2005)
      Evaluation of the security state of the computer system and the impact on the system is possible when incident distributions and attack objectives are known. Incident distribution shows parts of the computer system which ...