Return to Article Details Development of a method for checking vulnerabilities of a corporate network using Bernstein transformations Download Download PDF