메뉴 건너뛰기




Volumn , Issue , 2013, Pages 202-209

PReSET: A toolset for the evaluation of network resilience strategies

Author keywords

[No Author keywords available]

Indexed keywords

DYNAMIC RE-CONFIGURATION; ITS APPLICATIONS; ITS ARCHITECTURE; NETWORK RESILIENCE; POLICY BASED MANAGEMENT; RESILIENCE MECHANISM; RESILIENCE STRATEGY; SIMULATION ENVIRONMENT;

EID: 84883482512     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (16)

References (32)
  • 5
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the dos and ddos problems
    • T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of network-based defense mechanisms countering the DoS and DDoS problems," ACM Comput. Surv., vol. 39, no. 1, p. 3, 2007.
    • (2007) ACM Comput. Surv. , vol.39 , Issue.1 , pp. 3
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 6
    • 77953145744 scopus 로고    scopus 로고
    • A survey of internet worm detection and containment
    • P. Li, M. Salour, and X. Su, "A survey of internet worm detection and containment," IEEE Communications Surveys Tutorials, vol. 10, no. 1, pp. 20-35, 2008.
    • (2008) IEEE Communications Surveys Tutorials , vol.10 , Issue.1 , pp. 20-35
    • Li, P.1    Salour, M.2    Su, X.3
  • 7
    • 84883482185 scopus 로고    scopus 로고
    • Panda Security, Tech. Rep
    • PandLabs, "PandaLabs Annual Report 2011 Summary," Panda Security, Tech. Rep., 2011. [Online]. Available: http://press.pandasecurity.com/ wp-content/uploads/2012/01/Annual-Report-PandaLabs-2011.pdf
    • (2011) PandaLabs Annual Report 2011 Summary
  • 9
    • 84864669155 scopus 로고    scopus 로고
    • Openflow: A radical new idea in networking
    • Aug
    • T. A. Limoncelli, "OpenFlow: a radical new idea in networking," Commun. ACM, vol. 55, no. 8, pp. 42-47, Aug. 2012.
    • (2012) Commun. ACM , vol.55 , Issue.8 , pp. 42-47
    • Limoncelli, T.A.1
  • 12
  • 13
    • 0036506787 scopus 로고    scopus 로고
    • Security and management policy specification
    • Mar.-Apr
    • M. Sloman and E. Lupu, "Security and management policy specification," IEEE Network, vol. 16, no. 2, pp. 10-19, Mar.-Apr. 2002.
    • (2002) IEEE Network , vol.16 , Issue.2 , pp. 10-19
    • Sloman, M.1    Lupu, E.2
  • 14
    • 34249800566 scopus 로고    scopus 로고
    • NS-2 Website. Accessed in August
    • NS-2 Website, "The Network Simulator-NS-2," http://www.isi.edu/nsnam/ns/. Accessed in August 2012.
    • (2012) The Network Simulator-NS-2
  • 15
    • 77957550378 scopus 로고    scopus 로고
    • NS-3 Website. Accessed in August
    • NS-3 Website, "The NS-3 network simulator," http://www.nsnam.org/. Accessed in August 2012.
    • (2012) The NS-3 Network Simulator
  • 16
    • 84883476518 scopus 로고    scopus 로고
    • Accessed in August
    • OMNeT++ Website, "OMNeT++," http://www.omnetpp.org/. Accessed in August 2012.
    • (2012) OMNeT++
  • 17
    • 84883470782 scopus 로고    scopus 로고
    • Accessed in August
    • SSFNet Website, "Modeling the Global Internet," http://www.ssfnet.org/. Accessed in August 2012.
    • (2012) Modeling the Global Internet
  • 19
    • 84883477056 scopus 로고    scopus 로고
    • QualNet Website. Accessed in January
    • QualNet Website, "QualNet," http://www.scalablenetworks. com/content/products/qualnet. Accessed in January 2013.
    • (2013) QualNet
  • 21
    • 80655129208 scopus 로고    scopus 로고
    • Large-scale evaluation of distributed attack detection
    • Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
    • T. Gamer and C. P. Mayer, "Large-scale evaluation of distributed attack detection," in Simutools '09: Proceedings of the 2nd International Conference on Simulation Tools and Techniques. ICST, Brussels, Belgium, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2009, pp. 1-8.
    • (2009) Simutools '09: Proceedings of the 2nd International Conference on Simulation Tools and Techniques. ICST , pp. 1-8
    • Gamer, T.1    Mayer, C.P.2
  • 22
    • 77958537302 scopus 로고    scopus 로고
    • Institute of Telematics, Universität Karlsruhe (TH), Telematics Technical Report TM-2008-2, Feb
    • C. P. Mayer and T. Gamer, "Integrating real world applications into OMNeT++," Institute of Telematics, Universität Karlsruhe (TH), Telematics Technical Report TM-2008-2, Feb. 2008. [Online]. Available: http://doc.tm.uka.de/2008/TM-2008-2.pdf
    • (2008) Integrating Real World Applications into OMNeT++
    • Mayer, C.P.1    Gamer, T.2
  • 23
    • 69749100394 scopus 로고    scopus 로고
    • An information-Theoretic view of network-Aware malware attacks
    • September
    • Z. Chen and C. Ji, "An information-Theoretic view of network-Aware malware attacks," IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 530-541, September 2009.
    • (2009) IEEE Transactions on Information Forensics and Security , vol.4 , Issue.3 , pp. 530-541
    • Chen, Z.1    Ji, C.2
  • 32
    • 82155173457 scopus 로고    scopus 로고
    • Scadasim-A framework for building scada simulations
    • dec
    • C. Queiroz, A. Mahmood, and Z. Tari, "SCADASim-A Framework for Building SCADA Simulations," Smart Grid, IEEE Transactions on, vol. 2, no. 4, pp. 589-597, dec. 2011.
    • (2011) Smart Grid, IEEE Transactions on , vol.2 , Issue.4 , pp. 589-597
    • Queiroz, C.1    Mahmood, A.2    Tari, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.