Attacker Defender [software]
MetadataShow full item record
Simulation of attacker and defender strategies in random, clustered, and scale-free networks. Shows that network hubs and betweener nodes are the most important in terms of both attacker and defender strategies.
Center for Homeland Defense and Security Learning Materials: Simulations, Software and ToolsSimulation/software
Showing items related by title, author, creator and subject.
Kronzilber, Dor (Monterey, California: Naval Postgraduate School, 2017-09);We model attacks against computer networks in the cyber domain from the attacker’s point of view. We consider an attacker with limited resources and time, whose goal is to maximize the expected reward earned by exploiting ...
Lack, Lindsey A. (Monterey, California. Naval Postgraduate School, 2003-06);The attack of choice for a professional attacker is system subversion: the insertion of a trap door that allows the attacker to bypass an operating system's protection controls. This attack provides significant capabilities ...
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2004-12);Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permitting time to organize a better defense, and ...