Loading…
Verification method of network simulation for pervasive environments
The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is l...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 161 |
container_issue | |
container_start_page | 155 |
container_title | |
container_volume | |
creator | Kyuhyung Cho Jongsung Lee Jongin Lim Jongsub Moon |
description | The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis. |
doi_str_mv | 10.1109/SECCOM.2007.4550323 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4550323</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4550323</ieee_id><sourcerecordid>4550323</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-9d68674cb1b15f1c426cf5ff4a96a473cf642889977047e9aac6fe1cc68dc823</originalsourceid><addsrcrecordid>eNo1kMtOwzAURI1QJWjJF3TjH2jw4_q1RKFQpKIuqNhWrnMtDE1SOSGIvwfUMpvR6IxmMYTMOSs5Z-72ZVlVm-dSMGZKUIpJIS9I4YzlIACYMwouyfQ_gJ2Q6V_XCSaVuyJF37-zX4GSVthrcv-KOcUU_JC6ljY4vHU17SJtcfjq8gftU_N5OMHYZXrEPPo-jUixHVPu2gbbob8hk-gPPRZnn5Htw3JbrRbrzeNTdbdeJG7UsHC1ttpA2PM9V5EHEDpEFSN4pz0YGaIGYa1zxjAw6LwPOiIPQds6WCFnZH6aTYi4O-bU-Py9O58gfwCPJ0-I</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Verification method of network simulation for pervasive environments</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kyuhyung Cho ; Jongsung Lee ; Jongin Lim ; Jongsub Moon</creator><creatorcontrib>Kyuhyung Cho ; Jongsung Lee ; Jongin Lim ; Jongsub Moon</creatorcontrib><description>The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.</description><identifier>ISBN: 1424409748</identifier><identifier>ISBN: 9781424409747</identifier><identifier>EISBN: 9781424409754</identifier><identifier>EISBN: 1424409756</identifier><identifier>DOI: 10.1109/SECCOM.2007.4550323</identifier><identifier>LCCN: 2007920359</identifier><language>eng</language><publisher>IEEE</publisher><subject>Biological system modeling ; compare ; Computer worms ; Costs ; Information security ; Internet ; Mathematical model ; modeling ; Moon ; Security ; Simulation ; System testing ; Telecommunication traffic ; Traffic ; Traffic control ; Worm</subject><ispartof>2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, 2007, p.155-161</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4550323$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4550323$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kyuhyung Cho</creatorcontrib><creatorcontrib>Jongsung Lee</creatorcontrib><creatorcontrib>Jongin Lim</creatorcontrib><creatorcontrib>Jongsub Moon</creatorcontrib><title>Verification method of network simulation for pervasive environments</title><title>2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007</title><addtitle>SECCOM</addtitle><description>The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.</description><subject>Biological system modeling</subject><subject>compare</subject><subject>Computer worms</subject><subject>Costs</subject><subject>Information security</subject><subject>Internet</subject><subject>Mathematical model</subject><subject>modeling</subject><subject>Moon</subject><subject>Security</subject><subject>Simulation</subject><subject>System testing</subject><subject>Telecommunication traffic</subject><subject>Traffic</subject><subject>Traffic control</subject><subject>Worm</subject><isbn>1424409748</isbn><isbn>9781424409747</isbn><isbn>9781424409754</isbn><isbn>1424409756</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2007</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo1kMtOwzAURI1QJWjJF3TjH2jw4_q1RKFQpKIuqNhWrnMtDE1SOSGIvwfUMpvR6IxmMYTMOSs5Z-72ZVlVm-dSMGZKUIpJIS9I4YzlIACYMwouyfQ_gJ2Q6V_XCSaVuyJF37-zX4GSVthrcv-KOcUU_JC6ljY4vHU17SJtcfjq8gftU_N5OMHYZXrEPPo-jUixHVPu2gbbob8hk-gPPRZnn5Htw3JbrRbrzeNTdbdeJG7UsHC1ttpA2PM9V5EHEDpEFSN4pz0YGaIGYa1zxjAw6LwPOiIPQds6WCFnZH6aTYi4O-bU-Py9O58gfwCPJ0-I</recordid><startdate>200709</startdate><enddate>200709</enddate><creator>Kyuhyung Cho</creator><creator>Jongsung Lee</creator><creator>Jongin Lim</creator><creator>Jongsub Moon</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200709</creationdate><title>Verification method of network simulation for pervasive environments</title><author>Kyuhyung Cho ; Jongsung Lee ; Jongin Lim ; Jongsub Moon</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-9d68674cb1b15f1c426cf5ff4a96a473cf642889977047e9aac6fe1cc68dc823</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Biological system modeling</topic><topic>compare</topic><topic>Computer worms</topic><topic>Costs</topic><topic>Information security</topic><topic>Internet</topic><topic>Mathematical model</topic><topic>modeling</topic><topic>Moon</topic><topic>Security</topic><topic>Simulation</topic><topic>System testing</topic><topic>Telecommunication traffic</topic><topic>Traffic</topic><topic>Traffic control</topic><topic>Worm</topic><toplevel>online_resources</toplevel><creatorcontrib>Kyuhyung Cho</creatorcontrib><creatorcontrib>Jongsung Lee</creatorcontrib><creatorcontrib>Jongin Lim</creatorcontrib><creatorcontrib>Jongsub Moon</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kyuhyung Cho</au><au>Jongsung Lee</au><au>Jongin Lim</au><au>Jongsub Moon</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Verification method of network simulation for pervasive environments</atitle><btitle>2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007</btitle><stitle>SECCOM</stitle><date>2007-09</date><risdate>2007</risdate><spage>155</spage><epage>161</epage><pages>155-161</pages><isbn>1424409748</isbn><isbn>9781424409747</isbn><eisbn>9781424409754</eisbn><eisbn>1424409756</eisbn><abstract>The efficiency of pervasive system can be tested by several simulation techniques. But there are lacking to verify accuracy of simulation techniques. So we can bring some of studies which have been advanced for prediction and response about affection of malicious code spread out network. But it is lacking for the study about measurement of accuracy for simulation result too. So we suggest a new method for measure the accuracy for simulation result which can be used comparing several worm modeling and simulation thesis.</abstract><pub>IEEE</pub><doi>10.1109/SECCOM.2007.4550323</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1424409748 |
ispartof | 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007, 2007, p.155-161 |
issn | |
language | eng |
recordid | cdi_ieee_primary_4550323 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Biological system modeling compare Computer worms Costs Information security Internet Mathematical model modeling Moon Security Simulation System testing Telecommunication traffic Traffic Traffic control Worm |
title | Verification method of network simulation for pervasive environments |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T14%3A01%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Verification%20method%20of%20network%20simulation%20for%20pervasive%20environments&rft.btitle=2007%20Third%20International%20Conference%20on%20Security%20and%20Privacy%20in%20Communications%20Networks%20and%20the%20Workshops%20-%20SecureComm%202007&rft.au=Kyuhyung%20Cho&rft.date=2007-09&rft.spage=155&rft.epage=161&rft.pages=155-161&rft.isbn=1424409748&rft.isbn_list=9781424409747&rft_id=info:doi/10.1109/SECCOM.2007.4550323&rft.eisbn=9781424409754&rft.eisbn_list=1424409756&rft_dat=%3Cieee_6IE%3E4550323%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-9d68674cb1b15f1c426cf5ff4a96a473cf642889977047e9aac6fe1cc68dc823%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4550323&rfr_iscdi=true |