Attacker Defender [software]
MetadataShow full item record
Simulation of attacker and defender strategies in random, clustered, and scale-free networks. Shows that network hubs and betweener nodes are the most important in terms of both attacker and defender strategies.
Center for Homeland Defense and Security Learning Materials: Simulations, Software and ToolsSimulation/software
Showing items related by title, author, creator and subject.
Lack, Lindsey A. (Monterey, California. Naval Postgraduate School, 2003-06);The attack of choice for a professional attacker is system subversion: the insertion of a trap door that allows the attacker to bypass an operating system's protection controls. This attack provides significant capabilities ...
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2004-12);Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permitting time to organize a better defense, and ...
Pfeiff, Daniel M. (Monterey, California. Naval Postgraduate School, 2009-06);Self-Propelled Semi-Submersibles now transport an estimated 75% of cocaine originating from Colombia and headed for the United States. There are several types of search platforms (i.e., units to detect, classify, and ...