New technologies are increasing the vulnerability of the power system to cyber security threats. Dealing with these threats and determining vulnerabilities is an important task for …
The Real-Time Immersive Network Simulation Environment (RINSE) simulator is being developed to support large-scale network security preparedness and training exercises …
In this paper, we study the use of continuous-time hidden Markov models (CT-HMMs) for network protocol and application performance evaluation. We develop an algorithm to infer …
P Velho, A Legrand - 2nd International ICST Conference on Simulation …, 2010 - eudl.eu
Distributed computing is a very broad and active research area comprising fields such as cluster computing, computational grids, desktop grids and peer-to-peer (P2P) systems …
T Braun, M Diaz, JE Gabeiras, T Staub - 2008 - books.google.com
Page 1 Torsten Braun Michel Diaz José Enríquez Gabeiras Thomas Staub End-to-End Quality of Service Over Heterogeneous Networks Springer Page 2 End-to-End Quality of Service Over …
S Rafaeli, D Hutchison - Proceedings. Eleventh IEEE …, 2002 - ieeexplore.ieee.org
Hydra is a scaleable decentralised architecture to create and distribute symmetric cryptographic keys to large multicast-based groups. The group is divided into a number of …
S Bohacek, JP Hespanha, J Lee… - Proceedings of the 2003 …, 2003 - dl.acm.org
In this paper we present a general hybrid systems modeling framework to describe the flow of traffic in communication networks. To characterize network behavior, these models use …
This paper introduces a general hybrid systems framework to model the flow of traffic in communication networks. The proposed models use averaging to continuously approximate …
C Kiddle, R Simmonds, C Williamson… - … Workshop on Parallel …, 2003 - ieeexplore.ieee.org
Packet level discrete event network simulators use an event to model the movement of each packet in the network. This results in accurate models, but requires that many events are …