Attacker Defender [software]

Software OPEN
Lewis, Ted;
(2012)
  • Subject: Critical infrastructure protection
    arxiv: Computer Science::Cryptography and Security
    acm: ComputingMilieux_LEGALASPECTSOFCOMPUTING

Center for Homeland Defense and Security Learning Materials: Simulations, Software and Tools Simulation/software Simulation of attacker and defender strategies in random, clustered, and scale-free networks. Shows that network hubs and betweener nodes are the most ... View more
Share - Bookmark