On Modeling the Assessment of the Security of Information Resources in a Telecommunications Network of Centrally Protected Objects | IEEE Conference Publication | IEEE Xplore