Showing 1 - 20 results of 28 for search 'Defense Simulation Internet', query time: 0.15s Refine Results
  1. 1
    Published 2018
    Table of Contents: “… Proactive Defense Scheme Based on IP and MAC Address Mutation -- An Attribute Based Encryption Middleware…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 2
    Published 2012
    Table of Contents: “…Invited Talk: Human-Agent Teamwork in Cyber Defense -- Invited Talk: 25 Years of Distributed AI…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 3
    Published 2019
    Table of Contents: “… Simulated Environment -- Experiment of the Tactical Decision Support System Within Company Defensive…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 4
  5. 5
    Published 2012
    Table of Contents: “… - The DORII Platform Test Case.- Part II: Software Platforms -- 7. Sortism: A High-Level Simulator…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 6
    Published 2007
    Table of Contents: “… Framework for Reaction Mechanisms Simulation -- Identifying Dependency Between Secure Messages for Protocol…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 7
    Published 2016
    Table of Contents: “… Stability Indices -- CFD Simulation of Contaminant Transportation in High-Risk Buildings using CONTAM…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 8
    Published 2007
    Table of Contents: “… Cooperative Defense Against Internet Attacks -- On Competing Agents Consistent with Expert Knowledge…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 9
    Published 2008
    Table of Contents: “… Matchmaking and Argumentation -- Agent Applications in Defense Logistics -- AGENTFLY: Towards Multi-Agent…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 10
    Published 2011
    Subjects: “…Information Systems Applications (incl. Internet).…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 11
    Published 2015
    Table of Contents: “… Tutoring Context -- Intelligent Information Systems in Security and Defense -- FP-tree and SVM…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 12
    Published 2007
    Table of Contents: “… and Address Hopping for Active Cyber-Defense -- A Hybrid Model for Worm Simulations in a Large Network…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 13
    Published 2013
    Table of Contents: “… -- Simulation-Based Fault Propagation Analysis – Application on Hydrogen Production Plant -- Automatic…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 14
    Published 2007
    Table of Contents: “… Switching for Wireless Sensor Network -- WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 15
    Published 2018
    Table of Contents: “… and what you can't: human experience in computer network defenses -- Attack simulation for a realistic…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 16
    Published 2019
    Table of Contents: “… Resource Directory in Californium -- A Survey of Simulators for Home Energy Management: System Architecture…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 17
    Published 2003
    Table of Contents: “… for Viewing Internet Products on Mobile Phones -- Evolution -- A Conceptualization of OO Evolution -- Workflow…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 18
    Published 2013
    Table of Contents: “…Political and Economic Implications of Authoritarian Control of the Internet -- Data Handling…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 19
    Published 2019
    Table of Contents: “… of Cyber Attacks -- Chapter 8. Modeling and Simulation Approaches -- Part 3. Enhancing Cyber Resilience…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 20
    Published 2016
    Table of Contents: “… in Supply Chain Management for Internet Marketing.-Intelligent Mechanism for Cloud Federation…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search