Publication | Closed Access
An overview of cyber attack and computer network operations simulation
22
Citations
7
References
2011
Year
EngineeringCyber AttacksInformation SecurityNetwork AnalysisSimulationDefence TechnologyAttack SimulationSystems EngineeringModeling And SimulationSystem SimulationCurrent StateComputer EngineeringCyber WarfareComputer ScienceCyber AttackCyberattackNetwork SimulationCybersecurity SystemCyberwarfare
This paper represents a snapshot of the current state of the art in the simulation and modeling of cyber attacks and defensive responses to those. It discusses a number of simulations of cyber warfare, including live, virtual, and constructive simulations. The simulations discussed in this paper were found in the open literature and were conducted in the private sector, academia, and government. Each simulation is briefly described, including goals, methodology, and a brief discussion of its accomplishments. These modeling and simulation efforts are of particular interest to the military modeling and simulation community, as it is likely that military forces will continue to rely ever more heavily on computer and communication networks.
| Year | Citations | |
|---|---|---|
Page 1
Page 1