A process control approach to cyber attack detection
Communications of the ACM
Simulation Modeling and Analysis
Simulation Modeling and Analysis
Theory of Modeling and Simulation
Theory of Modeling and Simulation
DEVS Simulation of distributed intrusion detection systems
Transactions of the Society for Computer Simulation International - Recent advances in DEVS Methodology--part I
Vulnerability Assessment Simulation for Information Infrastructure Protection
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Survivability computation of networked information systems
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Vulnerability modeling and simulation for DNS intrusion tolerance system construction
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Hi-index | 0.00 |
As the structure and behavior of computer network becomes complicated and unpredictable, it becomes difficult to test the survivability of network. The modeling and simulation is a widely used approach to predict the behavior of system or set of system. In this research, we apply a modeling methodology to construct the valid model of computer network focusing on its vulnerability for survivability testing. To accomplish our aim, the appropriate modeling method should be defined. Especially, we take advantage of the system specification based modeling approach to construct valid network model.