Login / Signup
Using Camouflaged Cyber Simulations as a Model to Ensure Validity in Cybersecurity Experimentation.
Carrie Gardner
Abby Waliga
David Thaw
Sarah Churchman
Published in:
CoRR (2019)
Keyphrases
</>
probabilistic model
computational model
statistical model
information systems
high level
mathematical model
neural network
decision trees
case study
expert systems
theoretical analysis
process model
hierarchical structure
simulation model
prediction model
linear model