Cyber defense technology networking and evaluation
暂无分享,去创建一个
Catherine Rosenberg | S. Shankar Sastry | Ruzena Bajcsy | Carla E. Brodley | George Kesidis | Sally Floyd | Peng Liu | Sonia Fahmy | Karl N. Levitt | Vern Paxson | Shyhtsun Felix Wu | J. Doug Tygar | Terry V. Benzel | Anthony D. Joseph | David J. Miller | Russ Mundy | Matt Bishop | Robert Braden | W. Hardaker | Robert Lindell | Cliford Neuman | Ron Ostrenga | Phillip A. Porras | Daniel F. Sterne | S. F. Wu | V. Paxson | R. Bajcsy | K. Levitt | A. Joseph | J. Tygar | S. Floyd | C. Brodley | Peng Liu | G. Kesidis | S. Fahmy | W. Hardaker | R. Lindell | M. Bishop | R. Braden | R. Mundy | C. Neuman | Ron Ostrenga | C. Rosenberg | S. Sastry | D. Sterne
[1] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[2] Sally Floyd,et al. Difficulties in simulating the internet , 2001, TNET.
[3] Mike Hibler,et al. An integrated experimental environment for distributed systems and networks , 2002, OPSR.
[4] Krzysztof Pawlikowski,et al. On credibility of simulation studies of telecommunication networks , 2002, IEEE Commun. Mag..
[5] Roshan K. Thomas,et al. Justification and Requirements for a National DDoS Defense Technology Evaluation Facility , 2003 .
[6] Eddie Kohler,et al. Internet research needs better models , 2003, CCRV.
[7] David E. Culler,et al. A blueprint for introducing disruptive technology into the Internet , 2003, CCRV.