Login / Signup

Evaluating network cyber resiliency methods using cyber threat, Vulnerability and Defense Modeling and Simulation.

Suzanne HassellPaul BeraudAlen CruzGangadhar GangaSteve MartinJustin ToenniesPablo VazquezGary WrightDaniel GomezFrank PietrykaNiraj SrivastavaTravis HesterDavid HydeBrian Mastropietro
Published in: MILCOM (2012)
Keyphrases
  • preprocessing
  • significant improvement
  • benchmark datasets
  • real time
  • peer to peer
  • mathematical model
  • mathematical models
  • cyber security
  • buffer overflow
  • cyber defense