Simulation of Bio-inspired Security Mechanisms against Network Infrastructure Attacks
暂无分享,去创建一个
[1] Yong Tang,et al. Slowing down Internet worms , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[2] Igor V. Kotenko,et al. Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks , 2013, 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing.
[3] Thomas Gamer,et al. Large-scale evaluation of distributed attack detection , 2009, SIMUTools 2009.
[4] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[5] Philippe Owezarski,et al. A trace based method for realistic simulation , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[6] Brian W. Unger,et al. Applying parallel discrete event simulation to network emulation , 2000, Proceedings Fourteenth Workshop on Parallel and Distributed Simulation.
[7] Aziz Mohaisen,et al. Losing control of the internet: using the data plane to attack the control plane , 2010, CCS '10.
[8] Bernhard Plattner,et al. Experiences with worm propagation simulations , 2003, WORM '03.
[9] Léon J. M. Rothkrantz,et al. Ant-Based Load Balancing in Telecommunications Networks , 1996, Adapt. Behav..
[10] Dipankar Dasgupta,et al. Immuno-inspired autonomic system for cyber defense , 2007, Inf. Secur. Tech. Rep..
[11] Wenke Lee,et al. Simulating Internet worms , 2004, The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. (MASCOTS 2004). Proceedings..
[12] Jun Li,et al. SAVE: source address validity enforcement protocol , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[13] Stephanie Forrest,et al. Architecture for an Artificial Immune System , 2000, Evolutionary Computation.
[14] Lixia Zhang,et al. A taxonomy of biologically inspired research in computer networking , 2010, Comput. Networks.
[15] Andrey Shorov,et al. AGENT‑BASED MODELING AND SIMULATION OF BOTNETS AND BOTNET DEFENSE , 2010 .
[16] Scott Shenker,et al. Epidemic algorithms for replicated database maintenance , 1988, OPSR.
[17] Falko Dressler. Bio-inspired mechanisms for efficient and adaptive network security mechanisms , 2005, Service Management and Self-Organization in IP-based Networks.