6Optimal Checking Policy for a Server System with a Cyber Attack
Mitsuhiro Imaizumi
Aichi Gakusen University, Japan
CONTENTS
6.1 INTRODUCTION
In this chapter, we survey a server system which is attacked from various computers at random. As Internet technology and cloud computing have developed, huge amounts of data have been generated and stored in servers. These data are collected and analyzed and their results are utilized in many areas of business. The demands for the improvement of the reliability and security of servers connected with the Internet have increased. Cyber attacks on the Internet have become a problem in ...
Get Reliability and Maintenance Modeling with Optimization now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.