Sign in

A comprehensive framework to simulate network attacks and challenges.

Egemen K. ÇetinkayaDan BroylesAmit DandekarSripriya SrinivasanJames P. G. Sterbenz
Published in: ICUMT (2010)
Keyphrases
  • information systems
  • intrusion detection
  • data mining
  • data management