Login / Signup
Cyber attack modeling and simulation for network security analysis.
Michael E. Kuhl
Jason Kistner
Kevin Costantini
Moises Sudit
Published in:
WSC (2007)
Keyphrases
</>
security analysis
cyber attacks
cyber security
security requirements
smart card
computer networks
public key
network traffic
network structure
countermeasures
network management
cost effective
peer to peer
critical infrastructure
real time
access control
data collection
dos attacks
data mining