Simulating non-stationary congestion systems using splitting with applications to cyber security
暂无分享,去创建一个
Chun-Hung Chen | Martin J. Fischer | John F. Shortle | Denise M. Bevilacqua Masi | M. J. Fischer | Chun-Hung Chen | J. Shortle | D. Masi
[1] Hsiao-Chang Chen,et al. Optimal budget allocation for discrete-event simulation experiments , 2009 .
[2] Donald F. Towsley,et al. On the performance of Internet worm scanning strategies , 2006, Perform. Evaluation.
[3] Richard A. Clarke,et al. Cyber War: The Next Threat to National Security and What to Do About It , 2010 .
[4] Ray Bert,et al. Cyber War: The Next Threat to National Security and What to Do About It , by Richard A. Clarke and Robert K. Knake. New York: HarperCollins, 2010. , 2010 .
[5] Chun-Hung Chen,et al. Intelligent simulation for alternatives comparison and application to air traffic management , 2005 .
[6] Donald F. Towsley,et al. Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.
[7] Julia H. Allen. Information Security as an Institutional Priority , 2005 .
[8] Robert B. Cooper,et al. Queueing systems, volume II: computer applications : By Leonard Kleinrock. Wiley-Interscience, New York, 1976, xx + 549 pp. , 1977 .
[9] Chun-Hung Chen,et al. A preliminary study of optimal splitting for rare-event simulation , 2008, 2008 Winter Simulation Conference.
[10] Pierre L'Ecuyer,et al. Software for uniform random number generation: distinguishing the good and the bad , 2001, Proceeding of the 2001 Winter Simulation Conference (Cat. No.01CH37304).
[11] John F. Shortle,et al. Optimal splitting for rare-event simulation , 2012 .
[12] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[13] Weibo Gong,et al. Email Virus Propagation Modeling and Analysis , 2003 .
[14] G. J. A. Stern,et al. Queueing Systems, Volume 2: Computer Applications , 1976 .
[15] David M. Nicol,et al. Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure , 2003, Computer Performance Evaluation / TOOLS.
[16] Simon Liu,et al. Cyberattacks: Why, What, Who, and How , 2009, IT Professional.
[17] Loo Hay Lee,et al. Efficient Simulation Budget Allocation for Selecting an Optimal Subset , 2008, INFORMS J. Comput..
[18] Pierre L'Ecuyer,et al. An Object-Oriented Random-Number Package with Many Long Streams and Substreams , 2002, Oper. Res..