Return to Article Details A stochastic model of the security system's functional behavior for a critical infrastructure object Download Download PDF