SECUSIM: A Tool for the Cyber-Attack Simulation
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Cyber attack modeling and simulation for network security analysis
Proceedings of the 39th conference on Winter simulation: 40 years! The best is yet to come
Taxonomy of cyber attacks and simulation of their effects
Proceedings of the 2011 Military Modeling & Simulation Symposium
Taxonomy of cyber attacks and simulation of their effects
Proceedings of the 2011 Military Modeling & Simulation Symposium
Security challenges in IT infrastructure for cybersecurity curriculum support
SIGUCCS '12 Proceedings of the 40th annual ACM SIGUCCS conference on User services
Hi-index | 0.00 |
This paper represents a snapshot of the current state of the art in the simulation and modeling of cyber attacks and defensive responses to those. It discusses a number of simulations of cyber warfare, including live, virtual, and constructive simulations. The simulations discussed in this paper were found in the open literature and were conducted in the private sector, academia, and government. Each simulation is briefly described, including goals, methodology, and a brief discussion of its accomplishments. These modeling and simulation efforts are of particular interest to the military modeling and simulation community, as it is likely that military forces will continue to rely ever more heavily on computer and communication networks.