Loading…

Verification method of network simulation for pervasive environments

The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is l...

Full description

Saved in:
Bibliographic Details
Main Authors: Kyuhyung Cho, Jongsung Lee, Jongin Lim, Jongsub Moon
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 161
container_issue
container_start_page 155
container_title
container_volume
creator Kyuhyung Cho
Jongsung Lee
Jongin Lim
Jongsub Moon
description The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.
doi_str_mv 10.1109/SECCOM.2007.4550323
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4550323</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4550323</ieee_id><sourcerecordid>4550323</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-9d68674cb1b15f1c426cf5ff4a96a473cf642889977047e9aac6fe1cc68dc823</originalsourceid><addsrcrecordid>eNo1kMtOwzAURI1QJWjJF3TjH2jw4_q1RKFQpKIuqNhWrnMtDE1SOSGIvwfUMpvR6IxmMYTMOSs5Z-72ZVlVm-dSMGZKUIpJIS9I4YzlIACYMwouyfQ_gJ2Q6V_XCSaVuyJF37-zX4GSVthrcv-KOcUU_JC6ljY4vHU17SJtcfjq8gftU_N5OMHYZXrEPPo-jUixHVPu2gbbob8hk-gPPRZnn5Htw3JbrRbrzeNTdbdeJG7UsHC1ttpA2PM9V5EHEDpEFSN4pz0YGaIGYa1zxjAw6LwPOiIPQds6WCFnZH6aTYi4O-bU-Py9O58gfwCPJ0-I</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Verification method of network simulation for pervasive environments</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kyuhyung Cho ; Jongsung Lee ; Jongin Lim ; Jongsub Moon</creator><creatorcontrib>Kyuhyung Cho ; Jongsung Lee ; Jongin Lim ; Jongsub Moon</creatorcontrib><description>The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.</description><identifier>ISBN: 1424409748</identifier><identifier>ISBN: 9781424409747</identifier><identifier>EISBN: 9781424409754</identifier><identifier>EISBN: 1424409756</identifier><identifier>DOI: 10.1109/SECCOM.2007.4550323</identifier><identifier>LCCN: 2007920359</identifier><language>eng</language><publisher>IEEE</publisher><subject>Biological system modeling ; compare ; Computer worms ; Costs ; Information security ; Internet ; Mathematical model ; modeling ; Moon ; Security ; Simulation ; System testing ; Telecommunication traffic ; Traffic ; Traffic control ; Worm</subject><ispartof>2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, 2007, p.155-161</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4550323$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4550323$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kyuhyung Cho</creatorcontrib><creatorcontrib>Jongsung Lee</creatorcontrib><creatorcontrib>Jongin Lim</creatorcontrib><creatorcontrib>Jongsub Moon</creatorcontrib><title>Verification method of network simulation for pervasive environments</title><title>2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007</title><addtitle>SECCOM</addtitle><description>The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.</description><subject>Biological system modeling</subject><subject>compare</subject><subject>Computer worms</subject><subject>Costs</subject><subject>Information security</subject><subject>Internet</subject><subject>Mathematical model</subject><subject>modeling</subject><subject>Moon</subject><subject>Security</subject><subject>Simulation</subject><subject>System testing</subject><subject>Telecommunication traffic</subject><subject>Traffic</subject><subject>Traffic control</subject><subject>Worm</subject><isbn>1424409748</isbn><isbn>9781424409747</isbn><isbn>9781424409754</isbn><isbn>1424409756</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo1kMtOwzAURI1QJWjJF3TjH2jw4_q1RKFQpKIuqNhWrnMtDE1SOSGIvwfUMpvR6IxmMYTMOSs5Z-72ZVlVm-dSMGZKUIpJIS9I4YzlIACYMwouyfQ_gJ2Q6V_XCSaVuyJF37-zX4GSVthrcv-KOcUU_JC6ljY4vHU17SJtcfjq8gftU_N5OMHYZXrEPPo-jUixHVPu2gbbob8hk-gPPRZnn5Htw3JbrRbrzeNTdbdeJG7UsHC1ttpA2PM9V5EHEDpEFSN4pz0YGaIGYa1zxjAw6LwPOiIPQds6WCFnZH6aTYi4O-bU-Py9O58gfwCPJ0-I</recordid><startdate>200709</startdate><enddate>200709</enddate><creator>Kyuhyung Cho</creator><creator>Jongsung Lee</creator><creator>Jongin Lim</creator><creator>Jongsub Moon</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200709</creationdate><title>Verification method of network simulation for pervasive environments</title><author>Kyuhyung Cho ; Jongsung Lee ; Jongin Lim ; Jongsub Moon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-9d68674cb1b15f1c426cf5ff4a96a473cf642889977047e9aac6fe1cc68dc823</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Biological system modeling</topic><topic>compare</topic><topic>Computer worms</topic><topic>Costs</topic><topic>Information security</topic><topic>Internet</topic><topic>Mathematical model</topic><topic>modeling</topic><topic>Moon</topic><topic>Security</topic><topic>Simulation</topic><topic>System testing</topic><topic>Telecommunication traffic</topic><topic>Traffic</topic><topic>Traffic control</topic><topic>Worm</topic><toplevel>online_resources</toplevel><creatorcontrib>Kyuhyung Cho</creatorcontrib><creatorcontrib>Jongsung Lee</creatorcontrib><creatorcontrib>Jongin Lim</creatorcontrib><creatorcontrib>Jongsub Moon</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kyuhyung Cho</au><au>Jongsung Lee</au><au>Jongin Lim</au><au>Jongsub Moon</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Verification method of network simulation for pervasive environments</atitle><btitle>2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007</btitle><stitle>SECCOM</stitle><date>2007-09</date><risdate>2007</risdate><spage>155</spage><epage>161</epage><pages>155-161</pages><isbn>1424409748</isbn><isbn>9781424409747</isbn><eisbn>9781424409754</eisbn><eisbn>1424409756</eisbn><abstract>The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.</abstract><pub>IEEE</pub><doi>10.1109/SECCOM.2007.4550323</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1424409748
ispartof 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, 2007, p.155-161
issn
language eng
recordid cdi_ieee_primary_4550323
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Biological system modeling
compare
Computer worms
Costs
Information security
Internet
Mathematical model
modeling
Moon
Security
Simulation
System testing
Telecommunication traffic
Traffic
Traffic control
Worm
title Verification method of network simulation for pervasive environments
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T14%3A01%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Verification%20method%20of%20network%20simulation%20for%20pervasive%20environments&rft.btitle=2007%20Third%20International%20Conference%20on%20Security%20and%20Privacy%20in%20Communications%20Networks%20and%20the%20Workshops%20-%20SecureComm%202007&rft.au=Kyuhyung%20Cho&rft.date=2007-09&rft.spage=155&rft.epage=161&rft.pages=155-161&rft.isbn=1424409748&rft.isbn_list=9781424409747&rft_id=info:doi/10.1109/SECCOM.2007.4550323&rft.eisbn=9781424409754&rft.eisbn_list=1424409756&rft_dat=%3Cieee_6IE%3E4550323%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-9d68674cb1b15f1c426cf5ff4a96a473cf642889977047e9aac6fe1cc68dc823%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4550323&rfr_iscdi=true