An overview of cyber attack and computer network operations simulation
暂无分享,去创建一个
[1] Moises Sudit,et al. Cyber attack modeling and simulation for network security analysis , 2007, 2007 Winter Simulation Conference.
[2] Jong Sou Park,et al. SECUSIM: A Tool for the Cyber-Attack Simulation , 2001, ICICS.
[3] Scott D. Lathrop,et al. Information Warfare in the Trenches , 2003, World Conference on Information Security Education.
[4] Sheau-Dong Lang,et al. A Frequency-Based Approach to Intrusion Detection , 2004 .
[5] David M. Nicol,et al. Simulation of cyber attacks with applications in homeland defense training , 2003, SPIE Defense + Commercial Sensing.
[6] Raphael S Mudge,et al. Cyber and Air Joint Effects Demonstration (CAAJED) , 2008 .
[7] David M. Nicol,et al. RINSE: the real-time immersive network simulation environment for network security exercises , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).
[8] David M. Nicol,et al. RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version) , 2006, Simul..
[9] Kevin Costantini. Development of a cyber attack simulator for network modeling and cyber security analysis , 2007 .
[10] Sylvain P. Leblanc,et al. Taxonomy of cyber attacks and simulation of their effects , 2011, SpringSim.
[11] Fred Cohen,et al. Simulating cyber attacks, defences, and consequences , 1999, Comput. Secur..