共 39 条
[2]
Benson A., 2010, P 10 ACM SIGCOMM C I, P267, DOI [10.1145/1879141.1879175.5, DOI 10.1145/1879141.1879175, 10.1145/1879141.1879175]
[3]
Bosworth S., 2002, Computer security handbook
[4]
Simulation of cyber attacks with applications in homeland defense training
[J].
SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND DEFENSE AND LAW ENFORCEMENT II,
2003, 5071
:63-71
[5]
Agent directed HLA simulation for complex supply chain modeling
[J].
SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL,
2005, 81 (09)
:647-655
[6]
Calvin J O., 1996, 14th Workshop on Standards for the Interoperability of Distributed Simulations, V2, P705
[7]
Canavan JE., 2001, FUNDAMENTALS NETWORK
[8]
Chabukswar R, 2010, P 1 SEC CONTR SYST W
[9]
Channakeshava Karthik., 2009, Proceedings of the 2nd International Conference on Simulation Tools and Techniques, P6
[10]
Network Attack-Defense Simulation Training System Based on HLA
[J].
2009 INTERNATIONAL CONFERENCE ON COMPUTER MODELING AND SIMULATION, PROCEEDINGS,
2009,
:303-+