Mathematical Model of the Computer Attack Implementation Possibility by an Intruder | IEEE Conference Publication | IEEE Xplore