The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks
暂无分享,去创建一个
[1] Arnold Suvatne. Improved Worm Simulator and Simulations , 2010 .
[2] Igor V. Kotenko,et al. Simulation of Protection Mechanisms against Botnets on the Basis of "Nervous Network" Framework , 2012, SIMULTECH.
[3] Angelos D. Keromytis,et al. A cooperative immunization system for an untrusting Internet , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..
[4] Christoph P. Mayer,et al. Large-scale evaluation of distributed attack detection , 2009, SimuTools.
[5] Andrey Shorov,et al. AGENT‑BASED MODELING AND SIMULATION OF BOTNETS AND BOTNET DEFENSE , 2010 .
[6] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[7] Lixia Zhang,et al. A taxonomy of biologically inspired research in computer networking , 2010, Comput. Networks.
[8] Jyotsna Krishnaswamy,et al. The Undersigned Project Committee Approves the Project Titled WORMULATOR : A SIMULATOR FOR RAPIDLY SPREADING MALWARE by , 2018 .
[9] Falko Dressler. Bio-inspired mechanisms for efficient and adaptive network security mechanisms , 2005, Service Management and Self-Organization in IP-based Networks.
[10] Yong Tang,et al. Slowing down Internet worms , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[11] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[12] Kai Hwang,et al. Collaborative Detection of DDoS Attacks over Multiple Network Domains , 2007, IEEE Transactions on Parallel and Distributed Systems.
[13] Igor V. Kotenko,et al. Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks , 2013, 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.
[14] Scott Shenker,et al. Epidemic algorithms for replicated database maintenance , 1988, OPSR.
[15] Amin Vahdat,et al. Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .
[16] Wenke Lee,et al. Simulating Internet worms , 2004, The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. (MASCOTS 2004). Proceedings..
[17] Aziz Mohaisen,et al. Losing control of the internet: using the data plane to attack the control plane , 2010, CCS '10.
[18] Jun Li,et al. SAVE: source address validity enforcement protocol , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[19] Brian W. Unger,et al. Applying parallel discrete event simulation to network emulation , 2000, Proceedings Fourteenth Workshop on Parallel and Distributed Simulation.
[20] Kotagiri Ramamohanarao,et al. Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring , 2004, NETWORKING.
[21] Philippe Owezarski,et al. A trace based method for realistic simulation , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[22] Marco Dorigo,et al. AntNet: Distributed Stigmergetic Control for Communications Networks , 1998, J. Artif. Intell. Res..
[23] Igor V. Kotenko,et al. Agent‐based simulation of cooperative defence against botnets , 2012, Concurr. Comput. Pract. Exp..
[24] Bernhard Plattner,et al. Experiences with worm propagation simulations , 2003, WORM '03.