메뉴 건너뛰기




Volumn 2119, Issue , 2001, Pages 320-333

Network security modeling and cyber attack simulation methodology

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; CRIME; DISCRETE EVENT SIMULATION; SECURITY OF DATA; SPECIFICATIONS;

EID: 84958776699     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-47719-5_26     Document Type: Conference Paper
Times cited : (41)

References (10)
  • 4
    • 0004196127 scopus 로고
    • Modular Models: Intelligent Agents and Endomorphic systems, Academic Press
    • B. P. Zeigler, Object-oriented Simulation with Hierarchical, Modular Models: Intelligent Agents and Endomorphic systems, Academic Press, 1990.
    • (1990) Object-Oriented Simulation with Hierarchical
    • Zeigler, B.P.1
  • 7
    • 84958794659 scopus 로고    scopus 로고
    • The Process of Network Security, Addison-Wesley
    • T. A. Wadlow, The Process of Network Security, Addison-Wesley, 2000.
    • (2000)
    • Wadlow, T.A.1
  • 8
    • 84958794660 scopus 로고    scopus 로고
    • Running LINUX, Oreilly
    • W. Kaufman, Running LINUX, Oreilly, 1999.
    • (1999)
    • Kaufman, W.1
  • 10
    • 84958794661 scopus 로고    scopus 로고
    • MODSIM Manual, CACI
    • MODSIM Manual, CACI, 1997.
    • (1997)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.