IEEE Spectrum
Why we don't know how to simulate the Internet
Proceedings of the 29th conference on Winter simulation
A quantitative comparison of graph-based models for Internet topology
IEEE/ACM Transactions on Networking (TON)
Proceedings of the 6th international workshop on Hardware/software codesign
Java: data structures and programming
Java: data structures and programming
On power-law relationships of the Internet topology
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
On the origin of power laws in Internet topologies
ACM SIGCOMM Computer Communication Review
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
Network topology generators: degree-based vs. structural
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
On computer viral infection and the effect of immunization
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Designing a Framework for Active Worm Detection on Global Networks
IEEE-IWIA '03 Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03)
BRITE: An Approach to Universal Topology Generation
MASCOTS '01 Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Measuring and Modeling Computer Virus Prevalence
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Extending and enhancing GT-ITM
MoMeTools '03 Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research
Monitoring and early warning for internet worms
Proceedings of the 10th ACM conference on Computer and communications security
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 2
The MoR-Trust Distributed Trust Management System: Design and Simulation Results
Electronic Notes in Theoretical Computer Science (ENTCS)
An agent-based model to simulate coordinated response to malware outbreak within an organisation
International Journal of Information and Computer Security
Hi-index | 0.01 |
Graphs are useful data structures capable of efficiently representing a variety of technological and social networks. They are therefore utilized in simulation-based studies of new algorithms and protocols. Inspired by the popular tgff (Task Graphs For Free) toolkit, which creates task graphs for embedded systems, we present the ngce, an easy to use graph generator that produces structures for the study of the propagation of viral agents in complex computer networks. Designated track: Computer Security