Return to Article Details Modeling the vulnerabilities validation mechanism in the active analysis of the security of corporate networks using Bernstein polynomials Download Download PDF